Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_257.exe

Overview

General Information

Sample name:LisectAVT_2403002A_257.exe
Analysis ID:1482377
MD5:3914d1fe5113895ff467bcd01994037c
SHA1:f2f0e0e2bf57589a3880cfaf109d149ea27673a9
SHA256:b2060f6a5e17d27bb2413bc95ec71fb942151dd2984917831d64c6aa7120efc2
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_257.exe (PID: 4372 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe" MD5: 3914D1FE5113895FF467BCD01994037C)
    • RegSvcs.exe (PID: 2136 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.ionos.es", "Username": "sevialup@sevialup.es", "Password": "Pula0001*"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3357003020.0000000003018000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x334e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x3355b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x335e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x33677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x336e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x33753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x337e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x33879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x334e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x3355b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x335e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x33677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x336e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x33753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x337e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x33879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 213.165.67.102, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 2136, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49712
                  No Snort rule has matched
                  Timestamp:2024-07-25T21:58:10.317324+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49720
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-25T21:57:32.750606+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49714
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: LisectAVT_2403002A_257.exeAvira: detected
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.ionos.es", "Username": "sevialup@sevialup.es", "Password": "Pula0001*"}
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: LisectAVT_2403002A_257.exeJoe Sandbox ML: detected
                  Source: LisectAVT_2403002A_257.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: LisectAVT_2403002A_257.exe, 00000000.00000003.2138985594.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_257.exe, 00000000.00000003.2140243885.00000000037B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: LisectAVT_2403002A_257.exe, 00000000.00000003.2138985594.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_257.exe, 00000000.00000003.2140243885.00000000037B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_000CDBBE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0009C2A2 FindFirstFileExW,0_2_0009C2A2
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D68EE FindFirstFileW,FindClose,0_2_000D68EE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_000D698F
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_000CD076
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_000CD3A9
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_000D9642
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_000D979D
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_000D9B2B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_000D5C97
                  Source: global trafficTCP traffic: 192.168.2.6:49712 -> 213.165.67.102:587
                  Source: Joe Sandbox ViewIP Address: 213.165.67.102 213.165.67.102
                  Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
                  Source: global trafficTCP traffic: 192.168.2.6:49712 -> 213.165.67.102:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000DCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_000DCE44
                  Source: global trafficDNS traffic detected: DNS query: smtp.ionos.es
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356467262.0000000001239000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.geotrust.com/GeoTrustTLSRSACAG1.crt0
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356467262.0000000001239000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.geotrust.com/GeoTrustTLSRSACAG1.crl0v
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.ionos.es
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356467262.0000000001239000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://status.geotrust.com0
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356467262.0000000001239000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                  Source: RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micr.
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: RegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356288203.0000000001177000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 0V85.cs.Net Code: _8P4pVTg9Q
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000DEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_000DEAFF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000DED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_000DED6A
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000DEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_000DEAFF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_000CAA57
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000F9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_000F9576

                  System Summary

                  barindex
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: LisectAVT_2403002A_257.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8842b352-4
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fbb17c85-6
                  Source: LisectAVT_2403002A_257.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_13b4d033-6
                  Source: LisectAVT_2403002A_257.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e7591aef-f
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_000CD5EB
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_000C1201
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_000CE8F6
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D20460_2_000D2046
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000680600_2_00068060
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C82980_2_000C8298
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0009E4FF0_2_0009E4FF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0009676B0_2_0009676B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000F48730_2_000F4873
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0008CAA00_2_0008CAA0
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0006CAF00_2_0006CAF0
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0007CC390_2_0007CC39
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00096DD90_2_00096DD9
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0007B1190_2_0007B119
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000691C00_2_000691C0
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000813940_2_00081394
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0008781B0_2_0008781B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000679200_2_00067920
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0007997D0_2_0007997D
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00087A4A0_2_00087A4A
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00087CA70_2_00087CA7
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000B3CD50_2_000B3CD5
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000EBE440_2_000EBE44
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00099EEE0_2_00099EEE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_014F37900_2_014F3790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013C93702_2_013C9370
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013C9BE82_2_013C9BE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013C4A982_2_013C4A98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013CCEB82_2_013CCEB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013C3E802_2_013C3E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_013C41C82_2_013C41C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064656A02_2_064656A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06463F102_2_06463F10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0646BCA82_2_0646BCA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0646DCB82_2_0646DCB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06462AF82_2_06462AF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06469A902_2_06469A90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06468B3A2_2_06468B3A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064600402_2_06460040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06464FC02_2_06464FC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064632182_2_06463218
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: String function: 00080A30 appears 46 times
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: String function: 0007F9F2 appears 40 times
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: String function: 00069CB3 appears 31 times
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000003.2139715857.0000000003733000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LisectAVT_2403002A_257.exe
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000003.2139880965.00000000038DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LisectAVT_2403002A_257.exe
                  Source: LisectAVT_2403002A_257.exe, 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename13bf9a69-5794-4e60-83fc-a9c1956f6617.exe4 vs LisectAVT_2403002A_257.exe
                  Source: LisectAVT_2403002A_257.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 4Cl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 4Cl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 5jodGRGeKF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 5jodGRGeKF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 33JmeoXaqT.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 33JmeoXaqT.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 33JmeoXaqT.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, 33JmeoXaqT.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D37B5 GetLastError,FormatMessageW,0_2_000D37B5
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C10BF AdjustTokenPrivileges,CloseHandle,0_2_000C10BF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_000C16C3
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_000D51CD
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000EA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_000EA67C
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_000D648E
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000642A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_000642A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeFile created: C:\Users\user\AppData\Local\Temp\autC2E3.tmpJump to behavior
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_257.exe "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: LisectAVT_2403002A_257.exeStatic file information: File size 1167880 > 1048576
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: LisectAVT_2403002A_257.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: LisectAVT_2403002A_257.exe, 00000000.00000003.2138985594.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_257.exe, 00000000.00000003.2140243885.00000000037B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: LisectAVT_2403002A_257.exe, 00000000.00000003.2138985594.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_257.exe, 00000000.00000003.2140243885.00000000037B0000.00000004.00001000.00020000.00000000.sdmp
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: LisectAVT_2403002A_257.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000642DE
                  Source: LisectAVT_2403002A_257.exeStatic PE information: real checksum: 0x12d069 should be: 0x12d071
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00080A76 push ecx; ret 0_2_00080A89
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0007F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0007F98E
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000F1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_000F1C41
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97430
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeAPI/Special instruction interceptor: Address: 14F33B4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6056Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1218Jump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeAPI coverage: 3.9 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_000CDBBE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0009C2A2 FindFirstFileExW,0_2_0009C2A2
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D68EE FindFirstFileW,FindClose,0_2_000D68EE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_000D698F
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_000CD076
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_000CD3A9
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_000D9642
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_000D979D
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_000D9B2B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_000D5C97
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000642DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98515Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000DEAA2 BlockInput,0_2_000DEAA2
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00092622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00092622
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000642DE
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00084CE8 mov eax, dword ptr fs:[00000030h]0_2_00084CE8
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_014F3620 mov eax, dword ptr fs:[00000030h]0_2_014F3620
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_014F3680 mov eax, dword ptr fs:[00000030h]0_2_014F3680
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_014F1ED0 mov eax, dword ptr fs:[00000030h]0_2_014F1ED0
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_000C0B62
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00092622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00092622
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0008083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0008083F
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000809D5 SetUnhandledExceptionFilter,0_2_000809D5
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00080C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00080C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E5C008Jump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_000C1201
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000A2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_000A2BA5
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000CB226 SendInput,keybd_event,0_2_000CB226
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000E22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_000E22DA
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_000C0B62
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000C1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_000C1663
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_00080698 cpuid 0_2_00080698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000D8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_000D8195
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000BD27A GetUserNameW,0_2_000BD27A
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_0009B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0009B952
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000642DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000642DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000003018000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_257.exe PID: 4372, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2136, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_81
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_XP
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_XPe
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_VISTA
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_7
                  Source: LisectAVT_2403002A_257.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_257.exe PID: 4372, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2136, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002A_257.exe.2e40000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000003018000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3357003020.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_257.exe PID: 4372, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2136, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000E1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_000E1204
                  Source: C:\Users\user\Desktop\LisectAVT_2403002A_257.exeCode function: 0_2_000E1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_000E1806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets331
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials221
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  LisectAVT_2403002A_257.exe100%AviraTR/AVI.AgentTesla.xoryu
                  LisectAVT_2403002A_257.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://account.dyn.com/0%URL Reputationsafe
                  http://www.micr.0%Avira URL Cloudsafe
                  http://smtp.ionos.es0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  smtp.ionos.es
                  213.165.67.102
                  truetrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.micr.RegSvcs.exe, 00000002.00000002.3358591525.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://account.dyn.com/LisectAVT_2403002A_257.exe, 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://smtp.ionos.esRegSvcs.exe, 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    213.165.67.102
                    smtp.ionos.esGermany
                    8560ONEANDONE-ASBrauerstrasse48DEtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1482377
                    Start date and time:2024-07-25 21:56:23 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 4s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:LisectAVT_2403002A_257.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 51
                    • Number of non-executed functions: 295
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: LisectAVT_2403002A_257.exe
                    TimeTypeDescription
                    15:57:17API Interceptor36x Sleep call for process: RegSvcs.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    213.165.67.10260yQVZ67vj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      Nowe zam#U00f3wienie nr 201030019.exeGet hashmaliciousAgentTeslaBrowse
                        Barotse.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          SecuriteInfo.com.W32.MSIL_Kryptik.DSR.gen.Eldorado.16905.957.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            Quotation-ZX6350ZA Drilling Cum Milling Machine.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                              factra.exeGet hashmaliciousAgentTeslaBrowse
                                factura.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  SecuriteInfo.com.W32.MSIL_Kryptik.DSR.gen.Eldorado.18349.20671.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    PE20230509100837_OFERTA.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      FIYAT.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        smtp.ionos.esUSyhqVZT33vX26Y.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.165.67.118
                                        60yQVZ67vj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 213.165.67.102
                                        JUSTIFICANTE PAGO FACTURA.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 213.165.67.118
                                        Nowe zam#U00f3wienie nr 201030019.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.165.67.102
                                        pago.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 213.165.67.118
                                        Barotse.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 213.165.67.102
                                        biliecrypt.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        • 213.165.67.118
                                        Zapytanie ofertowe (7427-23 ROCKFIN).exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        • 213.165.67.118
                                        Tepanec.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 213.165.67.118
                                        9oDrWfhX1I.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.165.67.118
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ONEANDONE-ASBrauerstrasse48DELisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                                        • 217.160.0.157
                                        LisectAVT_2403002B_136.dllGet hashmaliciousEmotetBrowse
                                        • 82.165.152.127
                                        LisectAVT_2403002B_302.exeGet hashmaliciousBdaejec, EmotetBrowse
                                        • 82.223.70.24
                                        LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                                        • 217.76.156.252
                                        LisectAVT_2403002C_62.dllGet hashmaliciousEmotetBrowse
                                        • 87.106.46.107
                                        IIMG_00172424.exeGet hashmaliciousFormBookBrowse
                                        • 217.160.230.215
                                        eqqjbbjMlt.elfGet hashmaliciousUnknownBrowse
                                        • 217.160.0.226
                                        zkGOUJOnmc.elfGet hashmaliciousUnknownBrowse
                                        • 88.208.252.9
                                        Fzfee1Lgc2.elfGet hashmaliciousUnknownBrowse
                                        • 217.160.0.225
                                        gUJak0onLk.elfGet hashmaliciousUnknownBrowse
                                        • 217.160.0.116
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):151658
                                        Entropy (8bit):7.916239388646582
                                        Encrypted:false
                                        SSDEEP:3072:ah7ACv2Pfv2OG+uMbu4EjnTiTgVHhi44T58nXH9PAjPqqcM+9DBt9l4fu8NFcZuv:CbO7GLMbVEjTDVBi44TmXHlAv5+9t/mF
                                        MD5:1AC262408D5AAD3655787205F589A7BB
                                        SHA1:70C190BB7613C4FB6B95A0DBB013B6324419330C
                                        SHA-256:CD80A2832847BE58B303C6083173DC735952E7D5A9D45A1F351132035F4EA512
                                        SHA-512:52DE5B3298CF53A333906D829A9D4E242D5700AFBABB9D104A2AA20AB5258A53D1CAA2A9062FC4C25987D247DBB990D2E578CF45831F56F52DC2EF10C1710CFF
                                        Malicious:false
                                        Reputation:low
                                        Preview:EA06.....X...}..E.Q...6.qO.L..J..9.Pi...@.X..g.....k......X..=.z.....j0.U..1.."T9$.ME.U/.)l.Q*.Y....!.V..H-......kE".M..,f.....s....[.H..5..(...rsX..M...lE....Z...~k`....P......>l.5......4...Y.c.L.......(..`....cw....@..B..._6..C...~@..E.e3...v..`D@.;v..gs ......Uo%.oW..,|1).ZIo..)s..b.@..3...$...P.....fq..Pfr.uR.9...:Z...Z.B<.....!G..,>:....\......7..+T.E.E..k..........o....`..t..M......g0...Y/=.m....z.]O...G...7...P.;(..!L.yy.wwQ..N.s......x~.....4.K...Z....{1..*.M.B.4YG.U..|d....i...|./L~...l.T.$f?..Kz..rwj.Q..Y.?".I$R..kGX..v.L......l~.D.Q....g3...n.Y}..............p.. ..H.7....'..).....c7.....XU@....a).,9..M+....e_n8.Et...=)gw..h..,NZ.I..-.K.S.....Y...-.K........V8.Z.o.O...X\".F.Wk..D.aZ....2.N...*...U.M...V.......>_.7.zt1I.2J.......8|j......w........'=......(.)..wT.D..$.$.M&..:#.........;.j..G.R.s..j.J.S.....77..t.J...G..@.=..2.........(..Js..VjtYL.gR.Zd.y.J.N..-u.=.Wg.<).j.......s.e..o.Qh.Y.fqK.^o......Pi.8.O]F...;...3.S. ..b=Z.....
                                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):9974
                                        Entropy (8bit):7.603836919500672
                                        Encrypted:false
                                        SSDEEP:192:Q09SJLZ7jNO7shoLZnEUZ0r5Tl/sQrV7uDtkLNjSUVJj0CPna67Tr4qVBQnjfppF:z9SJtjiZEUGpECduOL8UVPv+mCjfNfv
                                        MD5:C8AF2C7A15AE9C811A2C9D20CFE4CA49
                                        SHA1:AE546CE73367C3CFE437EFAB60026352F8AD8731
                                        SHA-256:FA1F4BCD1CB8C05EBCB11B3D93ECC55D2E795A61E5B85CE8F05B7805767D125D
                                        SHA-512:2AC743C8B6EA7358F77BF4325946BCC3EC8E6A6958E98754E85DCB4EE82F750B8CBEE53FBF4F5145DDD9BE2BD88EB7A1C3DF929ED340EAF4ED122735EC683BDF
                                        Malicious:false
                                        Reputation:low
                                        Preview:EA06..t..L&.[...e....;..`....y...b.......s8..&...j.%.$.m8..Sp.N.g.....m.X@..K...c.$....lL.`..Ng6)...l.I...b....4..,S@..l.l.-z..f.6|v...Qc.0.......q4.Y..k..h......c ._..p.1....qa.H....9..$l.3..Y@.6...$.a5.H.f@.....|3....fs9..%d.M...5...&.@.@.K.I.....Y.x>9.....Y.j.;.......j.;-....Y@j.9.....K,..1...'.`....|.....,S`..N,`...H.......|....F. ,_...c3..........;..:&.>_L.n....f.G_T......|.).......&.....8...&V....ia...=.....Y......&..`.l..|.[.....Yl ....ab...,@....ib........h.._..@...3|.P.o.ac.....+.....N.i|sk....8..4|.0...c....7....k ..7.X..TD....M&`....g....,,`....>.Y...$.@&....L&.P.....32.|&.G%......h...,..33.%.....BS...Nf......f.4.L,.9."....Bvp.Y...ffS{$..d..,.@8@.......@.3d.L..k4.h..M.B:.Y...fg6.;.ab....98.L..:.....of.L.*..Fp........36.Y&.k,.b...' !...,t.33.4.c2.X.M....#......j.d...[..%3.....c....M'6...ic....!..,..3 k..p....@...L&..........., ....#......f.8.X..K..`....zn........0{.k7....!..,...S.%..9..J@^@.G'.......aa.M..)LM@B:.Y...ffS...r....@...N@.:.....n..Mf@....
                                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                        File Type:ASCII text, with very long lines (29698), with no line terminators
                                        Category:dropped
                                        Size (bytes):29698
                                        Entropy (8bit):3.5689281317480894
                                        Encrypted:false
                                        SSDEEP:768:G3i/mmQPGXVuVLFOA0AYwp5JX6j4LIkl1WfnS1uLphM:UieBPG8JFO1yuLDM
                                        MD5:BEAA74AD21C7C26C0F58F9E72CCF49E7
                                        SHA1:280F44865230FD78CDF540AF8B84CB9F38E05884
                                        SHA-256:81601445F8BF97DCC4463C2266C84A40BCE7C31FB5371EECA91D22220E123F82
                                        SHA-512:68896A49F0A560A000EA14BD715C1BD4EC3C661887815EB7DCF9ED3D5FB8F114ED5F1FAFE3E0A4981783F0DA29748A5C6B83ADC4210F09543ED6D6D825537D96
                                        Malicious:false
                                        Reputation:low
                                        Preview:x055b8ce18cecc20000065758bb6000000669854489b560000006698d468ab27000000669855888be6000000669854a89b560000006698d4c8abc6000000669855e88b33000000669854099b230000006698d429abe2000000669855498b46000000669854699bc60000006698d489abc6000000669855a9330c669854c99be60000006698d844ffffffab4700000066985964ffffff8b4600000066985884ffffff9bc60000006698d8a4ffffffabc6000000669859c4ffffff8be2000000669858e4ffffff9b460000006698d805ffffffabc600000066985925ffffff8bc600000066985845ffffff339c6698d865ffffffab570000006698550d8b370000006698542d9b560000006698d44dab270000006698556d8b330000006698548d9b230000006698d4adabe2000000669855cd8b46000000669854ed9bc60000006698d40eabc60000006698552e330c6698544e9b160000006698d886ffffffab46000000669859a6ffffff8b67000000669858c6ffffff9b160000006698d8e6ffffffab0700000066985907ffffff8b9600000066985827ffffff9b330000006698d847ffffffab2300000066985967ffffff8be200000066985887ffffff9b460000006698d8a7ffffffabc6000000669859c7ffffff8bc6000000669858e7ffffff339c6698d408ab370000006698550a8b86
                                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):240128
                                        Entropy (8bit):6.7262216217277
                                        Encrypted:false
                                        SSDEEP:6144:WkRLHKvNHU/2bxQmpGqg+EALjLeatDmLRjOAN:WkRLqliQx/pGELPRyRjOm
                                        MD5:7C878DF05DAF41BFAF8EC603B78E9120
                                        SHA1:B2EDBCBE50537CC9D4C13F6CA85F69F606B1B20F
                                        SHA-256:D083142DED8924C28B6784360FE78ACA546DCA4EE93BF4B7FAFE43D3B2F1104B
                                        SHA-512:AC914B287604E58B437B78A89286849F0B73D8C860AE816C36A8CC3004761F8A331DF5091C92F5DF015C9CEF28E23064260E7E22CE8555F2479AD93A4F775499
                                        Malicious:false
                                        Reputation:low
                                        Preview:.c.AOCFETGGX..8O.3VDA7W9.ALCFEPGGXYY8O23VDA7W9XALCFEPGGXYY8O.3VDO(.7X.E.g.Q..y.1Q<.C$+&E6Tx"--(*$g%=y+M!.Z8d.x..5.(&hH]McXYY8O23..A7.8[A.[. PGGXYY8O.3TEJ6\9X.OCFMPGGXYY..13VdA7W.[ALC.EPgGXY[8O63VDA7W9\ALCFEPGGX]Y8M23VDA7U9..LCVEPWGXYY(O2#VDA7W9HALCFEPGGXYY..13.DA7W.[A.FFEPGGXYY8O23VDA7W9X.OCJEPGGXYY8O23VDA7W9XALCFEPGGXYY8O23VDA7W9XALCFEPGGXYY8o23^DA7W9XALCFEXgGX.Y8O23VDA7W9v5);2EPGs.ZY8o23V.B7W;XALCFEPGGXYY8O.3V$oE$K;ALC.@PGG.ZY8I23V.B7W9XALCFEPGGX.Y8..A3(.TW9TALCF.SGGZYY8.13VDA7W9XALCFE.GG.YY8O23VDA7W9XALCV.SGGXYYpO23TDD7..ZAHrGESGGXXY8I23VDA7W9XALCFEPGGXYY8O23VDA7W9XALCFEPGGXYY8O23VD\......}.8nM%_...(.0..R..@..C.S.+S...5....fBQ..A.Lv..N...:.;S=@.....t#M4^/./vVY./.....vM...E(.*...'k.!4..m...{....J$....-..Q\;j G'U=o." $"..Z.X8O23.......%;..}DHFmK@.....u%/o...8EPG#XYYJO237DA7.9XA#CFE>GGX'Y8OL3VD.7W9.ALCqEPGbXYYUO23rDA7)9XA.>IJ...1*..O23VDt....,.....p..oI.Lh4|..]....C..H/...t...X.\..O.'Ee..@F^]\:H60ZyO|...`NGB@R@C[Ud6...e....a..7...".%8O23VD.7W.XAL..E.GGX.Y.O..VDA..9.A.C...G
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):7.03692986877142
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:LisectAVT_2403002A_257.exe
                                        File size:1'167'880 bytes
                                        MD5:3914d1fe5113895ff467bcd01994037c
                                        SHA1:f2f0e0e2bf57589a3880cfaf109d149ea27673a9
                                        SHA256:b2060f6a5e17d27bb2413bc95ec71fb942151dd2984917831d64c6aa7120efc2
                                        SHA512:056c7f88c2ab836e7399c67b95d2d03d04f7e3bb02ef7b0ffdab5a5ba7990bf016d9ee27d44ac591f514af674d55abf58adb462256606963653457c6b47f75ea
                                        SSDEEP:24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8aF83aszMg15alQt3d:YTvC/MTQYxsWR7aFwfMgzK
                                        TLSH:4B45BF0273D1C062FF9B92334B5AF6515BBC6A260123E61F13A81D79BE701B1563E7A3
                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                        Icon Hash:aaf3e3e3938382a0
                                        Entrypoint:0x420577
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66015722 [Mon Mar 25 10:51:14 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:1
                                        File Version Major:5
                                        File Version Minor:1
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:1
                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                        Instruction
                                        call 00007F7DA1275553h
                                        jmp 00007F7DA1274E5Fh
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        push dword ptr [ebp+08h]
                                        mov esi, ecx
                                        call 00007F7DA127503Dh
                                        mov dword ptr [esi], 0049FDF0h
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        and dword ptr [ecx+04h], 00000000h
                                        mov eax, ecx
                                        and dword ptr [ecx+08h], 00000000h
                                        mov dword ptr [ecx+04h], 0049FDF8h
                                        mov dword ptr [ecx], 0049FDF0h
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        push dword ptr [ebp+08h]
                                        mov esi, ecx
                                        call 00007F7DA127500Ah
                                        mov dword ptr [esi], 0049FE0Ch
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        and dword ptr [ecx+04h], 00000000h
                                        mov eax, ecx
                                        and dword ptr [ecx+08h], 00000000h
                                        mov dword ptr [ecx+04h], 0049FE14h
                                        mov dword ptr [ecx], 0049FE0Ch
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        mov esi, ecx
                                        lea eax, dword ptr [esi+04h]
                                        mov dword ptr [esi], 0049FDD0h
                                        and dword ptr [eax], 00000000h
                                        and dword ptr [eax+04h], 00000000h
                                        push eax
                                        mov eax, dword ptr [ebp+08h]
                                        add eax, 04h
                                        push eax
                                        call 00007F7DA1277BFDh
                                        pop ecx
                                        pop ecx
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        lea eax, dword ptr [ecx+04h]
                                        mov dword ptr [ecx], 0049FDD0h
                                        push eax
                                        call 00007F7DA1277C48h
                                        pop ecx
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        mov esi, ecx
                                        lea eax, dword ptr [esi+04h]
                                        mov dword ptr [esi], 0049FDD0h
                                        push eax
                                        call 00007F7DA1277C31h
                                        test byte ptr [ebp+08h], 00000001h
                                        pop ecx
                                        Programming Language:
                                        • [ C ] VS2008 SP1 build 30729
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x46670.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x11b0000x7594.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0xd40000x466700x4680063b2ca37ebb01b7916630f593036862dFalse0.9061807402482269data7.8450347333184345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x11b0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                        RT_RCDATA0xdc7b80x3d938data1.0003409775747771
                                        RT_GROUP_ICON0x11a0f00x76dataEnglishGreat Britain0.6610169491525424
                                        RT_GROUP_ICON0x11a1680x14dataEnglishGreat Britain1.25
                                        RT_GROUP_ICON0x11a17c0x14dataEnglishGreat Britain1.15
                                        RT_GROUP_ICON0x11a1900x14dataEnglishGreat Britain1.25
                                        RT_VERSION0x11a1a40xdcdataEnglishGreat Britain0.6181818181818182
                                        RT_MANIFEST0x11a2800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                        DLLImport
                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                        PSAPI.DLLGetProcessMemoryInfo
                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                        UxTheme.dllIsThemeActive
                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishGreat Britain
                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                        2024-07-25T21:58:10.317324+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972020.114.59.183192.168.2.6
                                        2024-07-25T21:57:32.750606+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971420.114.59.183192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 25, 2024 21:57:18.677875996 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:18.684581995 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:18.684925079 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:19.674895048 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:19.676285028 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:19.676378012 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:19.689269066 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:19.715593100 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:19.902532101 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:19.902760983 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:19.908590078 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.097316980 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.139909983 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.360167027 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.365725994 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.553894043 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.553947926 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.553961992 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.554096937 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.557436943 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.564028978 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.755285025 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:20.796000004 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.952133894 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:20.957027912 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.142819881 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.167432070 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:21.174547911 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.363312006 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.388716936 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:21.393826962 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.614000082 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.614320040 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:21.619246960 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.819484949 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:21.819727898 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:21.824521065 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.015018940 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.015754938 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:22.020870924 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.207551003 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.208197117 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:22.208256960 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:22.208307028 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:22.208307028 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:57:22.213155031 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.213207006 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.213217020 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.213439941 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.541827917 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:57:22.592876911 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:58:58.671369076 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:58:58.700340033 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:58:58.889653921 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:58:58.889969110 CEST58749712213.165.67.102192.168.2.6
                                        Jul 25, 2024 21:58:58.890149117 CEST49712587192.168.2.6213.165.67.102
                                        Jul 25, 2024 21:58:58.893179893 CEST49712587192.168.2.6213.165.67.102
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 25, 2024 21:57:18.657232046 CEST6307253192.168.2.61.1.1.1
                                        Jul 25, 2024 21:57:18.665592909 CEST53630721.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jul 25, 2024 21:57:18.657232046 CEST192.168.2.61.1.1.10xef97Standard query (0)smtp.ionos.esA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jul 25, 2024 21:57:18.665592909 CEST1.1.1.1192.168.2.60xef97No error (0)smtp.ionos.es213.165.67.102A (IP address)IN (0x0001)false
                                        Jul 25, 2024 21:57:18.665592909 CEST1.1.1.1192.168.2.60xef97No error (0)smtp.ionos.es213.165.67.118A (IP address)IN (0x0001)false
                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Jul 25, 2024 21:57:19.674895048 CEST58749712213.165.67.102192.168.2.6220 kundenserver.de (mreue009) Nemesis ESMTP Service ready
                                        Jul 25, 2024 21:57:19.676285028 CEST58749712213.165.67.102192.168.2.6220 kundenserver.de (mreue009) Nemesis ESMTP Service ready
                                        Jul 25, 2024 21:57:19.689269066 CEST49712587192.168.2.6213.165.67.102EHLO 965543
                                        Jul 25, 2024 21:57:19.902532101 CEST58749712213.165.67.102192.168.2.6250-kundenserver.de Hello 965543 [8.46.123.33]
                                        250-8BITMIME
                                        250-SIZE 141557760
                                        250 STARTTLS
                                        Jul 25, 2024 21:57:19.902760983 CEST49712587192.168.2.6213.165.67.102STARTTLS
                                        Jul 25, 2024 21:57:20.097316980 CEST58749712213.165.67.102192.168.2.6220 OK

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:15:57:12
                                        Start date:25/07/2024
                                        Path:C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
                                        Imagebase:0x60000
                                        File size:1'167'880 bytes
                                        MD5 hash:3914D1FE5113895FF467BCD01994037C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2142927939.0000000002E40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:15:57:14
                                        Start date:25/07/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
                                        Imagebase:0xc60000
                                        File size:45'984 bytes
                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3357003020.0000000003018000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3357003020.0000000002FEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3356004037.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3357003020.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3357003020.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:3.2%
                                          Dynamic/Decrypted Code Coverage:0.4%
                                          Signature Coverage:2.9%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:53
                                          execution_graph 96294 61044 96299 610f3 96294->96299 96296 6104a 96335 800a3 29 API calls __onexit 96296->96335 96298 61054 96336 61398 96299->96336 96303 6116a 96346 6a961 96303->96346 96306 6a961 22 API calls 96307 6117e 96306->96307 96308 6a961 22 API calls 96307->96308 96309 61188 96308->96309 96310 6a961 22 API calls 96309->96310 96311 611c6 96310->96311 96312 6a961 22 API calls 96311->96312 96313 61292 96312->96313 96351 6171c 96313->96351 96317 612c4 96318 6a961 22 API calls 96317->96318 96319 612ce 96318->96319 96372 71940 96319->96372 96321 612f9 96382 61aab 96321->96382 96323 61315 96324 61325 GetStdHandle 96323->96324 96325 6137a 96324->96325 96326 a2485 96324->96326 96329 61387 OleInitialize 96325->96329 96326->96325 96327 a248e 96326->96327 96389 7fddb 96327->96389 96329->96296 96330 a2495 96399 d011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96330->96399 96332 a249e 96400 d0944 CreateThread 96332->96400 96334 a24aa CloseHandle 96334->96325 96335->96298 96401 613f1 96336->96401 96339 613f1 22 API calls 96340 613d0 96339->96340 96341 6a961 22 API calls 96340->96341 96342 613dc 96341->96342 96408 66b57 96342->96408 96344 61129 96345 61bc3 6 API calls 96344->96345 96345->96303 96347 7fe0b 22 API calls 96346->96347 96348 6a976 96347->96348 96349 7fddb 22 API calls 96348->96349 96350 61174 96349->96350 96350->96306 96352 6a961 22 API calls 96351->96352 96353 6172c 96352->96353 96354 6a961 22 API calls 96353->96354 96355 61734 96354->96355 96356 6a961 22 API calls 96355->96356 96357 6174f 96356->96357 96358 7fddb 22 API calls 96357->96358 96359 6129c 96358->96359 96360 61b4a 96359->96360 96361 61b58 96360->96361 96362 6a961 22 API calls 96361->96362 96363 61b63 96362->96363 96364 6a961 22 API calls 96363->96364 96365 61b6e 96364->96365 96366 6a961 22 API calls 96365->96366 96367 61b79 96366->96367 96368 6a961 22 API calls 96367->96368 96369 61b84 96368->96369 96370 7fddb 22 API calls 96369->96370 96371 61b96 RegisterWindowMessageW 96370->96371 96371->96317 96373 71981 96372->96373 96377 7195d 96372->96377 96453 80242 5 API calls __Init_thread_wait 96373->96453 96376 78727 96381 7196e 96376->96381 96456 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96376->96456 96377->96381 96455 80242 5 API calls __Init_thread_wait 96377->96455 96378 7198b 96378->96377 96454 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96378->96454 96381->96321 96383 a272d 96382->96383 96384 61abb 96382->96384 96457 d3209 23 API calls 96383->96457 96385 7fddb 22 API calls 96384->96385 96387 61ac3 96385->96387 96387->96323 96388 a2738 96391 7fde0 96389->96391 96390 8ea0c ___std_exception_copy 21 API calls 96390->96391 96391->96390 96392 7fdfa 96391->96392 96395 7fdfc 96391->96395 96458 84ead 7 API calls 2 library calls 96391->96458 96392->96330 96394 8066d 96460 832a4 RaiseException 96394->96460 96395->96394 96459 832a4 RaiseException 96395->96459 96398 8068a 96398->96330 96399->96332 96400->96334 96461 d092a 28 API calls 96400->96461 96402 6a961 22 API calls 96401->96402 96403 613fc 96402->96403 96404 6a961 22 API calls 96403->96404 96405 61404 96404->96405 96406 6a961 22 API calls 96405->96406 96407 613c6 96406->96407 96407->96339 96409 66b67 _wcslen 96408->96409 96410 a4ba1 96408->96410 96413 66ba2 96409->96413 96414 66b7d 96409->96414 96431 693b2 96410->96431 96412 a4baa 96412->96412 96415 7fddb 22 API calls 96413->96415 96420 66f34 22 API calls 96414->96420 96417 66bae 96415->96417 96421 7fe0b 96417->96421 96418 66b85 __fread_nolock 96418->96344 96420->96418 96423 7fddb 96421->96423 96424 7fdfa 96423->96424 96426 7fdfc 96423->96426 96435 8ea0c 96423->96435 96442 84ead 7 API calls 2 library calls 96423->96442 96424->96418 96430 8066d 96426->96430 96443 832a4 RaiseException 96426->96443 96429 8068a 96429->96418 96444 832a4 RaiseException 96430->96444 96432 693c0 96431->96432 96433 693c9 __fread_nolock 96431->96433 96432->96433 96447 6aec9 96432->96447 96433->96412 96433->96433 96440 93820 __dosmaperr 96435->96440 96436 9385e 96446 8f2d9 20 API calls __dosmaperr 96436->96446 96437 93849 RtlAllocateHeap 96439 9385c 96437->96439 96437->96440 96439->96423 96440->96436 96440->96437 96445 84ead 7 API calls 2 library calls 96440->96445 96442->96423 96443->96430 96444->96429 96445->96440 96446->96439 96448 6aedc 96447->96448 96452 6aed9 __fread_nolock 96447->96452 96449 7fddb 22 API calls 96448->96449 96450 6aee7 96449->96450 96451 7fe0b 22 API calls 96450->96451 96451->96452 96452->96433 96453->96378 96454->96377 96455->96376 96456->96381 96457->96388 96458->96391 96459->96394 96460->96398 96462 62de3 96463 62df0 __wsopen_s 96462->96463 96464 a2c2b ___scrt_fastfail 96463->96464 96465 62e09 96463->96465 96467 a2c47 GetOpenFileNameW 96464->96467 96478 63aa2 96465->96478 96469 a2c96 96467->96469 96471 66b57 22 API calls 96469->96471 96473 a2cab 96471->96473 96473->96473 96475 62e27 96506 644a8 96475->96506 96535 a1f50 96478->96535 96481 63ace 96483 66b57 22 API calls 96481->96483 96482 63ae9 96541 6a6c3 96482->96541 96485 63ada 96483->96485 96537 637a0 96485->96537 96488 62da5 96489 a1f50 __wsopen_s 96488->96489 96490 62db2 GetLongPathNameW 96489->96490 96491 66b57 22 API calls 96490->96491 96492 62dda 96491->96492 96493 63598 96492->96493 96494 6a961 22 API calls 96493->96494 96495 635aa 96494->96495 96496 63aa2 23 API calls 96495->96496 96497 635b5 96496->96497 96498 a32eb 96497->96498 96499 635c0 96497->96499 96504 a330d 96498->96504 96559 7ce60 41 API calls 96498->96559 96547 6515f 96499->96547 96505 635df 96505->96475 96560 64ecb 96506->96560 96509 a3833 96582 d2cf9 96509->96582 96511 64ecb 94 API calls 96513 644e1 96511->96513 96512 a3848 96515 a3869 96512->96515 96516 a384c 96512->96516 96513->96509 96514 644e9 96513->96514 96517 644f5 96514->96517 96518 a3854 96514->96518 96520 7fe0b 22 API calls 96515->96520 96623 64f39 96516->96623 96622 6940c 136 API calls 2 library calls 96517->96622 96629 cda5a 82 API calls 96518->96629 96534 a38ae 96520->96534 96523 62e31 96524 a3862 96524->96515 96525 a3a5f 96526 64f39 68 API calls 96525->96526 96633 c989b 82 API calls __wsopen_s 96525->96633 96526->96525 96531 69cb3 22 API calls 96531->96534 96534->96525 96534->96531 96608 6a4a1 96534->96608 96616 63ff7 96534->96616 96630 c967e 22 API calls __fread_nolock 96534->96630 96631 c95ad 42 API calls _wcslen 96534->96631 96632 d0b5a 22 API calls 96534->96632 96536 63aaf GetFullPathNameW 96535->96536 96536->96481 96536->96482 96538 637ae 96537->96538 96539 693b2 22 API calls 96538->96539 96540 62e12 96539->96540 96540->96488 96542 6a6d0 96541->96542 96543 6a6dd 96541->96543 96542->96485 96544 7fddb 22 API calls 96543->96544 96545 6a6e7 96544->96545 96546 7fe0b 22 API calls 96545->96546 96546->96542 96548 6516e 96547->96548 96552 6518f __fread_nolock 96547->96552 96550 7fe0b 22 API calls 96548->96550 96549 7fddb 22 API calls 96551 635cc 96549->96551 96550->96552 96553 635f3 96551->96553 96552->96549 96554 63605 96553->96554 96558 63624 __fread_nolock 96553->96558 96556 7fe0b 22 API calls 96554->96556 96555 7fddb 22 API calls 96557 6363b 96555->96557 96556->96558 96557->96505 96558->96555 96559->96498 96634 64e90 LoadLibraryA 96560->96634 96565 64ef6 LoadLibraryExW 96642 64e59 LoadLibraryA 96565->96642 96566 a3ccf 96568 64f39 68 API calls 96566->96568 96569 a3cd6 96568->96569 96571 64e59 3 API calls 96569->96571 96573 a3cde 96571->96573 96664 650f5 96573->96664 96574 64f20 96574->96573 96575 64f2c 96574->96575 96577 64f39 68 API calls 96575->96577 96579 644cd 96577->96579 96579->96509 96579->96511 96581 a3d05 96583 d2d15 96582->96583 96584 6511f 64 API calls 96583->96584 96585 d2d29 96584->96585 96928 d2e66 96585->96928 96588 d2d3f 96588->96512 96589 650f5 40 API calls 96590 d2d56 96589->96590 96591 650f5 40 API calls 96590->96591 96592 d2d66 96591->96592 96593 650f5 40 API calls 96592->96593 96594 d2d81 96593->96594 96595 650f5 40 API calls 96594->96595 96596 d2d9c 96595->96596 96597 6511f 64 API calls 96596->96597 96598 d2db3 96597->96598 96599 8ea0c ___std_exception_copy 21 API calls 96598->96599 96600 d2dba 96599->96600 96601 8ea0c ___std_exception_copy 21 API calls 96600->96601 96602 d2dc4 96601->96602 96603 650f5 40 API calls 96602->96603 96604 d2dd8 96603->96604 96605 d28fe 27 API calls 96604->96605 96606 d2dee 96605->96606 96606->96588 96934 d22ce 96606->96934 96610 6a52b 96608->96610 96615 6a4b1 __fread_nolock 96608->96615 96609 7fddb 22 API calls 96611 6a4b8 96609->96611 96612 7fe0b 22 API calls 96610->96612 96613 7fddb 22 API calls 96611->96613 96614 6a4d6 96611->96614 96612->96615 96613->96614 96614->96534 96615->96609 96617 6400a 96616->96617 96621 640ae 96616->96621 96618 7fe0b 22 API calls 96617->96618 96620 6403c 96617->96620 96618->96620 96619 7fddb 22 API calls 96619->96620 96620->96619 96620->96621 96621->96534 96622->96523 96624 64f43 96623->96624 96625 64f4a 96623->96625 96626 8e678 67 API calls 96624->96626 96627 64f6a FreeLibrary 96625->96627 96628 64f59 96625->96628 96626->96625 96627->96628 96628->96518 96629->96524 96630->96534 96631->96534 96632->96534 96633->96525 96635 64ec6 96634->96635 96636 64ea8 GetProcAddress 96634->96636 96639 8e5eb 96635->96639 96637 64eb8 96636->96637 96637->96635 96638 64ebf FreeLibrary 96637->96638 96638->96635 96672 8e52a 96639->96672 96641 64eea 96641->96565 96641->96566 96643 64e6e GetProcAddress 96642->96643 96644 64e8d 96642->96644 96645 64e7e 96643->96645 96647 64f80 96644->96647 96645->96644 96646 64e86 FreeLibrary 96645->96646 96646->96644 96648 7fe0b 22 API calls 96647->96648 96649 64f95 96648->96649 96733 65722 96649->96733 96651 64fa1 __fread_nolock 96652 650a5 96651->96652 96653 a3d1d 96651->96653 96663 64fdc 96651->96663 96736 642a2 CreateStreamOnHGlobal 96652->96736 96747 d304d 74 API calls 96653->96747 96656 a3d22 96658 6511f 64 API calls 96656->96658 96657 650f5 40 API calls 96657->96663 96659 a3d45 96658->96659 96660 650f5 40 API calls 96659->96660 96662 6506e messages 96660->96662 96662->96574 96663->96656 96663->96657 96663->96662 96742 6511f 96663->96742 96665 65107 96664->96665 96666 a3d70 96664->96666 96769 8e8c4 96665->96769 96669 d28fe 96911 d274e 96669->96911 96671 d2919 96671->96581 96675 8e536 CallCatchBlock 96672->96675 96673 8e544 96697 8f2d9 20 API calls __dosmaperr 96673->96697 96675->96673 96677 8e574 96675->96677 96676 8e549 96698 927ec 26 API calls ___std_exception_copy 96676->96698 96679 8e579 96677->96679 96680 8e586 96677->96680 96699 8f2d9 20 API calls __dosmaperr 96679->96699 96689 98061 96680->96689 96683 8e58f 96684 8e5a2 96683->96684 96685 8e595 96683->96685 96701 8e5d4 LeaveCriticalSection __fread_nolock 96684->96701 96700 8f2d9 20 API calls __dosmaperr 96685->96700 96687 8e554 __wsopen_s 96687->96641 96690 9806d CallCatchBlock 96689->96690 96702 92f5e EnterCriticalSection 96690->96702 96692 9807b 96703 980fb 96692->96703 96696 980ac __wsopen_s 96696->96683 96697->96676 96698->96687 96699->96687 96700->96687 96701->96687 96702->96692 96711 9811e 96703->96711 96704 98088 96717 980b7 96704->96717 96705 98177 96722 94c7d 20 API calls 2 library calls 96705->96722 96707 98180 96723 929c8 96707->96723 96710 98189 96710->96704 96729 93405 11 API calls 2 library calls 96710->96729 96711->96704 96711->96705 96711->96711 96720 8918d EnterCriticalSection 96711->96720 96721 891a1 LeaveCriticalSection 96711->96721 96713 981a8 96730 8918d EnterCriticalSection 96713->96730 96716 981bb 96716->96704 96732 92fa6 LeaveCriticalSection 96717->96732 96719 980be 96719->96696 96720->96711 96721->96711 96722->96707 96724 929fc _free 96723->96724 96725 929d3 RtlFreeHeap 96723->96725 96724->96710 96725->96724 96726 929e8 96725->96726 96731 8f2d9 20 API calls __dosmaperr 96726->96731 96728 929ee GetLastError 96728->96724 96729->96713 96730->96716 96731->96728 96732->96719 96734 7fddb 22 API calls 96733->96734 96735 65734 96734->96735 96735->96651 96737 642bc FindResourceExW 96736->96737 96741 642d9 96736->96741 96738 a35ba LoadResource 96737->96738 96737->96741 96739 a35cf SizeofResource 96738->96739 96738->96741 96740 a35e3 LockResource 96739->96740 96739->96741 96740->96741 96741->96663 96743 6512e 96742->96743 96744 a3d90 96742->96744 96748 8ece3 96743->96748 96747->96656 96751 8eaaa 96748->96751 96750 6513c 96750->96663 96755 8eab6 CallCatchBlock 96751->96755 96752 8eac2 96764 8f2d9 20 API calls __dosmaperr 96752->96764 96754 8eae8 96766 8918d EnterCriticalSection 96754->96766 96755->96752 96755->96754 96756 8eac7 96765 927ec 26 API calls ___std_exception_copy 96756->96765 96759 8eaf4 96767 8ec0a 62 API calls 2 library calls 96759->96767 96761 8eb08 96768 8eb27 LeaveCriticalSection __fread_nolock 96761->96768 96763 8ead2 __wsopen_s 96763->96750 96764->96756 96765->96763 96766->96759 96767->96761 96768->96763 96772 8e8e1 96769->96772 96771 65118 96771->96669 96773 8e8ed CallCatchBlock 96772->96773 96774 8e92d 96773->96774 96775 8e925 __wsopen_s 96773->96775 96778 8e900 ___scrt_fastfail 96773->96778 96785 8918d EnterCriticalSection 96774->96785 96775->96771 96777 8e937 96786 8e6f8 96777->96786 96799 8f2d9 20 API calls __dosmaperr 96778->96799 96781 8e91a 96800 927ec 26 API calls ___std_exception_copy 96781->96800 96785->96777 96790 8e70a ___scrt_fastfail 96786->96790 96792 8e727 96786->96792 96787 8e717 96874 8f2d9 20 API calls __dosmaperr 96787->96874 96789 8e71c 96875 927ec 26 API calls ___std_exception_copy 96789->96875 96790->96787 96790->96792 96794 8e76a __fread_nolock 96790->96794 96801 8e96c LeaveCriticalSection __fread_nolock 96792->96801 96793 8e886 ___scrt_fastfail 96877 8f2d9 20 API calls __dosmaperr 96793->96877 96794->96792 96794->96793 96802 8d955 96794->96802 96809 98d45 96794->96809 96876 8cf78 26 API calls 4 library calls 96794->96876 96799->96781 96800->96775 96801->96775 96803 8d961 96802->96803 96804 8d976 96802->96804 96878 8f2d9 20 API calls __dosmaperr 96803->96878 96804->96794 96806 8d966 96879 927ec 26 API calls ___std_exception_copy 96806->96879 96808 8d971 96808->96794 96810 98d6f 96809->96810 96811 98d57 96809->96811 96813 990d9 96810->96813 96818 98db4 96810->96818 96889 8f2c6 20 API calls __dosmaperr 96811->96889 96905 8f2c6 20 API calls __dosmaperr 96813->96905 96814 98d5c 96890 8f2d9 20 API calls __dosmaperr 96814->96890 96817 990de 96906 8f2d9 20 API calls __dosmaperr 96817->96906 96819 98d64 96818->96819 96821 98dbf 96818->96821 96825 98def 96818->96825 96819->96794 96891 8f2c6 20 API calls __dosmaperr 96821->96891 96822 98dcc 96907 927ec 26 API calls ___std_exception_copy 96822->96907 96824 98dc4 96892 8f2d9 20 API calls __dosmaperr 96824->96892 96828 98e08 96825->96828 96829 98e4a 96825->96829 96830 98e2e 96825->96830 96828->96830 96864 98e15 96828->96864 96896 93820 21 API calls 2 library calls 96829->96896 96893 8f2c6 20 API calls __dosmaperr 96830->96893 96833 98e33 96894 8f2d9 20 API calls __dosmaperr 96833->96894 96834 98e61 96837 929c8 _free 20 API calls 96834->96837 96840 98e6a 96837->96840 96838 98fb3 96841 99029 96838->96841 96845 98fcc GetConsoleMode 96838->96845 96839 98e3a 96895 927ec 26 API calls ___std_exception_copy 96839->96895 96843 929c8 _free 20 API calls 96840->96843 96844 9902d ReadFile 96841->96844 96846 98e71 96843->96846 96847 990a1 GetLastError 96844->96847 96848 99047 96844->96848 96845->96841 96849 98fdd 96845->96849 96851 98e7b 96846->96851 96852 98e96 96846->96852 96853 990ae 96847->96853 96854 99005 96847->96854 96848->96847 96855 9901e 96848->96855 96849->96844 96850 98fe3 ReadConsoleW 96849->96850 96850->96855 96856 98fff GetLastError 96850->96856 96897 8f2d9 20 API calls __dosmaperr 96851->96897 96899 99424 28 API calls __fread_nolock 96852->96899 96903 8f2d9 20 API calls __dosmaperr 96853->96903 96871 98e45 __fread_nolock 96854->96871 96900 8f2a3 20 API calls 2 library calls 96854->96900 96865 9906c 96855->96865 96866 99083 96855->96866 96855->96871 96856->96854 96857 929c8 _free 20 API calls 96857->96819 96862 98e80 96898 8f2c6 20 API calls __dosmaperr 96862->96898 96863 990b3 96904 8f2c6 20 API calls __dosmaperr 96863->96904 96880 9f89b 96864->96880 96901 98a61 31 API calls 3 library calls 96865->96901 96870 9909a 96866->96870 96866->96871 96902 988a1 29 API calls __fread_nolock 96870->96902 96871->96857 96873 9909f 96873->96871 96874->96789 96875->96792 96876->96794 96877->96789 96878->96806 96879->96808 96881 9f8a8 96880->96881 96882 9f8b5 96880->96882 96908 8f2d9 20 API calls __dosmaperr 96881->96908 96884 9f8c1 96882->96884 96909 8f2d9 20 API calls __dosmaperr 96882->96909 96884->96838 96886 9f8ad 96886->96838 96887 9f8e2 96910 927ec 26 API calls ___std_exception_copy 96887->96910 96889->96814 96890->96819 96891->96824 96892->96822 96893->96833 96894->96839 96895->96871 96896->96834 96897->96862 96898->96871 96899->96864 96900->96871 96901->96871 96902->96873 96903->96863 96904->96871 96905->96817 96906->96822 96907->96819 96908->96886 96909->96887 96910->96886 96914 8e4e8 96911->96914 96913 d275d 96913->96671 96917 8e469 96914->96917 96916 8e505 96916->96913 96918 8e478 96917->96918 96919 8e48c 96917->96919 96925 8f2d9 20 API calls __dosmaperr 96918->96925 96924 8e488 __alldvrm 96919->96924 96927 9333f 11 API calls 2 library calls 96919->96927 96921 8e47d 96926 927ec 26 API calls ___std_exception_copy 96921->96926 96924->96916 96925->96921 96926->96924 96927->96924 96933 d2e7a 96928->96933 96929 d2d3b 96929->96588 96929->96589 96930 650f5 40 API calls 96930->96933 96931 d28fe 27 API calls 96931->96933 96932 6511f 64 API calls 96932->96933 96933->96929 96933->96930 96933->96931 96933->96932 96935 d22d9 96934->96935 96936 d22e7 96934->96936 96937 8e5eb 29 API calls 96935->96937 96938 d232c 96936->96938 96939 8e5eb 29 API calls 96936->96939 96950 d22f0 96936->96950 96937->96936 96963 d2557 96938->96963 96940 d2311 96939->96940 96940->96938 96942 d231a 96940->96942 96947 8e678 67 API calls 96942->96947 96942->96950 96943 d2370 96944 d2395 96943->96944 96945 d2374 96943->96945 96967 d2171 96944->96967 96946 d2381 96945->96946 96949 8e678 67 API calls 96945->96949 96946->96950 96952 8e678 67 API calls 96946->96952 96947->96950 96949->96946 96950->96588 96951 d239d 96953 d23c3 96951->96953 96954 d23a3 96951->96954 96952->96950 96974 d23f3 96953->96974 96956 d23b0 96954->96956 96957 8e678 67 API calls 96954->96957 96956->96950 96958 8e678 67 API calls 96956->96958 96957->96956 96958->96950 96959 d23de 96959->96950 96962 8e678 67 API calls 96959->96962 96960 d23ca 96960->96959 96982 8e678 96960->96982 96962->96950 96964 d257c 96963->96964 96966 d2565 __fread_nolock 96963->96966 96965 8e8c4 __fread_nolock 40 API calls 96964->96965 96965->96966 96966->96943 96968 8ea0c ___std_exception_copy 21 API calls 96967->96968 96969 d217f 96968->96969 96970 8ea0c ___std_exception_copy 21 API calls 96969->96970 96971 d2190 96970->96971 96972 8ea0c ___std_exception_copy 21 API calls 96971->96972 96973 d219c 96972->96973 96973->96951 96980 d2408 96974->96980 96975 d24c0 96999 d2724 96975->96999 96977 d21cc 40 API calls 96977->96980 96980->96975 96980->96977 96981 d24c7 96980->96981 96995 d2606 96980->96995 97003 d2269 40 API calls 96980->97003 96981->96960 96983 8e684 CallCatchBlock 96982->96983 96984 8e6aa 96983->96984 96985 8e695 96983->96985 96994 8e6a5 __wsopen_s 96984->96994 97039 8918d EnterCriticalSection 96984->97039 97056 8f2d9 20 API calls __dosmaperr 96985->97056 96987 8e69a 97057 927ec 26 API calls ___std_exception_copy 96987->97057 96990 8e6c6 97040 8e602 96990->97040 96992 8e6d1 97058 8e6ee LeaveCriticalSection __fread_nolock 96992->97058 96994->96959 96996 d2617 96995->96996 96997 d261d 96995->96997 96996->96997 97004 d26d7 96996->97004 96997->96980 97000 d2742 96999->97000 97001 d2731 96999->97001 97000->96981 97002 8dbb3 65 API calls 97001->97002 97002->97000 97003->96980 97005 d2714 97004->97005 97006 d2703 97004->97006 97005->96996 97008 8dbb3 97006->97008 97009 8dbc1 97008->97009 97015 8dbdd 97008->97015 97010 8dbcd 97009->97010 97011 8dbe3 97009->97011 97009->97015 97020 8f2d9 20 API calls __dosmaperr 97010->97020 97017 8d9cc 97011->97017 97014 8dbd2 97021 927ec 26 API calls ___std_exception_copy 97014->97021 97015->97005 97022 8d97b 97017->97022 97019 8d9f0 97019->97015 97020->97014 97021->97015 97023 8d987 CallCatchBlock 97022->97023 97030 8918d EnterCriticalSection 97023->97030 97025 8d995 97031 8d9f4 97025->97031 97029 8d9b3 __wsopen_s 97029->97019 97030->97025 97032 949a1 27 API calls 97031->97032 97033 8da09 97032->97033 97034 8da3a 62 API calls 97033->97034 97035 8da24 97034->97035 97036 94a56 62 API calls 97035->97036 97037 8d9a2 97036->97037 97038 8d9c0 LeaveCriticalSection __fread_nolock 97037->97038 97038->97029 97039->96990 97041 8e60f 97040->97041 97042 8e624 97040->97042 97084 8f2d9 20 API calls __dosmaperr 97041->97084 97047 8e61f 97042->97047 97059 8dc0b 97042->97059 97044 8e614 97085 927ec 26 API calls ___std_exception_copy 97044->97085 97047->96992 97051 8d955 __fread_nolock 26 API calls 97052 8e646 97051->97052 97069 9862f 97052->97069 97055 929c8 _free 20 API calls 97055->97047 97056->96987 97057->96994 97058->96994 97060 8dc1f 97059->97060 97061 8dc23 97059->97061 97065 94d7a 97060->97065 97061->97060 97062 8d955 __fread_nolock 26 API calls 97061->97062 97063 8dc43 97062->97063 97086 959be 97063->97086 97066 94d90 97065->97066 97067 8e640 97065->97067 97066->97067 97068 929c8 _free 20 API calls 97066->97068 97067->97051 97068->97067 97070 9863e 97069->97070 97071 98653 97069->97071 97209 8f2c6 20 API calls __dosmaperr 97070->97209 97072 9868e 97071->97072 97077 9867a 97071->97077 97211 8f2c6 20 API calls __dosmaperr 97072->97211 97075 98643 97210 8f2d9 20 API calls __dosmaperr 97075->97210 97206 98607 97077->97206 97078 98693 97212 8f2d9 20 API calls __dosmaperr 97078->97212 97081 8e64c 97081->97047 97081->97055 97082 9869b 97213 927ec 26 API calls ___std_exception_copy 97082->97213 97084->97044 97085->97047 97087 959ca CallCatchBlock 97086->97087 97088 959d2 97087->97088 97090 959ea 97087->97090 97165 8f2c6 20 API calls __dosmaperr 97088->97165 97089 95a88 97170 8f2c6 20 API calls __dosmaperr 97089->97170 97090->97089 97095 95a1f 97090->97095 97093 959d7 97166 8f2d9 20 API calls __dosmaperr 97093->97166 97094 95a8d 97171 8f2d9 20 API calls __dosmaperr 97094->97171 97111 95147 EnterCriticalSection 97095->97111 97099 95a95 97172 927ec 26 API calls ___std_exception_copy 97099->97172 97100 95a25 97102 95a41 97100->97102 97103 95a56 97100->97103 97167 8f2d9 20 API calls __dosmaperr 97102->97167 97112 95aa9 97103->97112 97106 95a46 97168 8f2c6 20 API calls __dosmaperr 97106->97168 97107 959df __wsopen_s 97107->97060 97108 95a51 97169 95a80 LeaveCriticalSection __wsopen_s 97108->97169 97111->97100 97113 95ad7 97112->97113 97150 95ad0 97112->97150 97114 95adb 97113->97114 97115 95afa 97113->97115 97180 8f2c6 20 API calls __dosmaperr 97114->97180 97118 95b4b 97115->97118 97119 95b2e 97115->97119 97122 95b61 97118->97122 97186 99424 28 API calls __fread_nolock 97118->97186 97183 8f2c6 20 API calls __dosmaperr 97119->97183 97120 95cb1 97120->97108 97121 95ae0 97181 8f2d9 20 API calls __dosmaperr 97121->97181 97173 9564e 97122->97173 97126 95ae7 97182 927ec 26 API calls ___std_exception_copy 97126->97182 97128 95b33 97184 8f2d9 20 API calls __dosmaperr 97128->97184 97134 95b3b 97197 80a8c 97150->97197 97165->97093 97166->97107 97167->97106 97168->97108 97169->97107 97170->97094 97171->97099 97172->97107 97174 9f89b __fread_nolock 26 API calls 97173->97174 97175 9565e 97174->97175 97180->97121 97181->97126 97182->97150 97183->97128 97184->97134 97186->97122 97198 80a95 97197->97198 97199 80a97 IsProcessorFeaturePresent 97197->97199 97198->97120 97201 80c5d 97199->97201 97205 80c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97201->97205 97203 80d40 97203->97120 97205->97203 97214 98585 97206->97214 97209->97075 97210->97081 97211->97078 97212->97082 97213->97081 97215 98591 CallCatchBlock 97214->97215 97225 95147 EnterCriticalSection 97215->97225 97217 9859f 97218 985d1 97217->97218 97219 985c6 97217->97219 97241 8f2d9 20 API calls __dosmaperr 97218->97241 97226 986ae 97219->97226 97222 985cc 97242 985fb LeaveCriticalSection __wsopen_s 97222->97242 97224 985ee __wsopen_s 97225->97217 97243 953c4 97226->97243 97229 986be 97241->97222 97242->97224 97244 953d1 97243->97244 97248 953e6 97243->97248 97245 8f2c6 __dosmaperr 20 API calls 97244->97245 97246 8f2c6 __dosmaperr 20 API calls 97248->97246 97251 9540b 97248->97251 97251->97229 97258 98402 97263 981be 97258->97263 97261 9842a 97264 981ef try_get_first_available_module 97263->97264 97274 98338 97264->97274 97278 88e0b 40 API calls 2 library calls 97264->97278 97266 983ee 97282 927ec 26 API calls ___std_exception_copy 97266->97282 97268 98343 97268->97261 97275 a0984 97268->97275 97270 9838c 97270->97274 97279 88e0b 40 API calls 2 library calls 97270->97279 97272 983ab 97272->97274 97280 88e0b 40 API calls 2 library calls 97272->97280 97274->97268 97281 8f2d9 20 API calls __dosmaperr 97274->97281 97283 a0081 97275->97283 97277 a099f 97277->97261 97278->97270 97279->97272 97280->97274 97281->97266 97282->97268 97286 a008d CallCatchBlock 97283->97286 97284 a009b 97341 8f2d9 20 API calls __dosmaperr 97284->97341 97286->97284 97288 a00d4 97286->97288 97287 a00a0 97342 927ec 26 API calls ___std_exception_copy 97287->97342 97294 a065b 97288->97294 97293 a00aa __wsopen_s 97293->97277 97344 a042f 97294->97344 97297 a068d 97376 8f2c6 20 API calls __dosmaperr 97297->97376 97298 a06a6 97362 95221 97298->97362 97301 a06ab 97303 a06cb 97301->97303 97304 a06b4 97301->97304 97302 a0692 97377 8f2d9 20 API calls __dosmaperr 97302->97377 97375 a039a CreateFileW 97303->97375 97378 8f2c6 20 API calls __dosmaperr 97304->97378 97308 a06b9 97379 8f2d9 20 API calls __dosmaperr 97308->97379 97310 a0781 GetFileType 97311 a078c GetLastError 97310->97311 97317 a07d3 97310->97317 97382 8f2a3 20 API calls 2 library calls 97311->97382 97312 a0756 GetLastError 97381 8f2a3 20 API calls 2 library calls 97312->97381 97315 a0704 97315->97310 97315->97312 97380 a039a CreateFileW 97315->97380 97316 a079a CloseHandle 97316->97302 97321 a07c3 97316->97321 97384 9516a 21 API calls 3 library calls 97317->97384 97320 a0749 97320->97310 97320->97312 97383 8f2d9 20 API calls __dosmaperr 97321->97383 97322 a07f4 97324 a0840 97322->97324 97385 a05ab 72 API calls 4 library calls 97322->97385 97329 a086d 97324->97329 97386 a014d 72 API calls 4 library calls 97324->97386 97325 a07c8 97325->97302 97328 a0866 97328->97329 97330 a087e 97328->97330 97331 986ae __wsopen_s 29 API calls 97329->97331 97332 a00f8 97330->97332 97333 a08fc CloseHandle 97330->97333 97331->97332 97343 a0121 LeaveCriticalSection __wsopen_s 97332->97343 97387 a039a CreateFileW 97333->97387 97335 a0927 97336 a095d 97335->97336 97337 a0931 GetLastError 97335->97337 97336->97332 97388 8f2a3 20 API calls 2 library calls 97337->97388 97339 a093d 97389 95333 21 API calls 3 library calls 97339->97389 97341->97287 97342->97293 97343->97293 97345 a0450 97344->97345 97350 a046a 97344->97350 97345->97350 97397 8f2d9 20 API calls __dosmaperr 97345->97397 97348 a045f 97398 927ec 26 API calls ___std_exception_copy 97348->97398 97390 a03bf 97350->97390 97351 a04d1 97359 a0524 97351->97359 97401 8d70d 26 API calls 2 library calls 97351->97401 97352 a04a2 97352->97351 97399 8f2d9 20 API calls __dosmaperr 97352->97399 97355 a051f 97357 a059e 97355->97357 97355->97359 97356 a04c6 97400 927ec 26 API calls ___std_exception_copy 97356->97400 97402 927fc 11 API calls _abort 97357->97402 97359->97297 97359->97298 97361 a05aa 97363 9522d CallCatchBlock 97362->97363 97405 92f5e EnterCriticalSection 97363->97405 97366 95259 97409 95000 21 API calls 3 library calls 97366->97409 97367 95234 97367->97366 97371 952c7 EnterCriticalSection 97367->97371 97374 9527b 97367->97374 97369 952a4 __wsopen_s 97369->97301 97370 9525e 97370->97374 97410 95147 EnterCriticalSection 97370->97410 97373 952d4 LeaveCriticalSection 97371->97373 97371->97374 97373->97367 97406 9532a 97374->97406 97375->97315 97376->97302 97377->97332 97378->97308 97379->97302 97380->97320 97381->97302 97382->97316 97383->97325 97384->97322 97385->97324 97386->97328 97387->97335 97388->97339 97389->97336 97392 a03d7 97390->97392 97391 a03f2 97391->97352 97392->97391 97403 8f2d9 20 API calls __dosmaperr 97392->97403 97394 a0416 97404 927ec 26 API calls ___std_exception_copy 97394->97404 97396 a0421 97396->97352 97397->97348 97398->97350 97399->97356 97400->97351 97401->97355 97402->97361 97403->97394 97404->97396 97405->97367 97411 92fa6 LeaveCriticalSection 97406->97411 97408 95331 97408->97369 97409->97370 97410->97374 97411->97408 97412 b2a00 97418 6d7b0 messages 97412->97418 97413 6d9d5 97414 6db11 PeekMessageW 97414->97418 97415 6d807 GetInputState 97415->97414 97415->97418 97416 b1cbe TranslateAcceleratorW 97416->97418 97418->97413 97418->97414 97418->97415 97418->97416 97419 6db8f PeekMessageW 97418->97419 97420 6da04 timeGetTime 97418->97420 97421 6db73 TranslateMessage DispatchMessageW 97418->97421 97422 6dbaf Sleep 97418->97422 97423 b2b74 Sleep 97418->97423 97426 b1dda timeGetTime 97418->97426 97444 6dd50 97418->97444 97451 6dfd0 97418->97451 97474 71310 97418->97474 97530 6bf40 256 API calls 2 library calls 97418->97530 97531 7edf6 IsDialogMessageW GetClassLongW 97418->97531 97533 d3a2a 23 API calls 97418->97533 97534 6ec40 97418->97534 97558 d359c 82 API calls __wsopen_s 97418->97558 97419->97418 97420->97418 97421->97419 97425 6dbc0 97422->97425 97423->97425 97424 7e551 timeGetTime 97424->97425 97425->97413 97425->97418 97425->97424 97429 b2c0b GetExitCodeProcess 97425->97429 97430 f29bf GetForegroundWindow 97425->97430 97434 b2a31 97425->97434 97435 b2ca9 Sleep 97425->97435 97559 e5658 23 API calls 97425->97559 97560 ce97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97425->97560 97561 cd4dc 47 API calls 97425->97561 97532 7e300 23 API calls 97426->97532 97432 b2c21 WaitForSingleObject 97429->97432 97433 b2c37 CloseHandle 97429->97433 97430->97425 97432->97418 97432->97433 97433->97425 97434->97413 97435->97418 97445 6dd83 97444->97445 97446 6dd6f 97444->97446 97563 d359c 82 API calls __wsopen_s 97445->97563 97562 6d260 256 API calls 2 library calls 97446->97562 97449 6dd7a 97449->97418 97450 b2f75 97450->97450 97452 6e010 97451->97452 97471 6e0dc messages 97452->97471 97570 80242 5 API calls __Init_thread_wait 97452->97570 97455 b2fca 97457 6a961 22 API calls 97455->97457 97455->97471 97456 6a961 22 API calls 97456->97471 97458 b2fe4 97457->97458 97571 800a3 29 API calls __onexit 97458->97571 97462 b2fee 97572 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97462->97572 97465 6ec40 256 API calls 97465->97471 97466 d359c 82 API calls 97466->97471 97469 6e3e1 97469->97418 97470 704f0 22 API calls 97470->97471 97471->97456 97471->97465 97471->97466 97471->97469 97471->97470 97564 6a8c7 97471->97564 97568 6a81b 41 API calls 97471->97568 97569 7a308 256 API calls 97471->97569 97573 80242 5 API calls __Init_thread_wait 97471->97573 97574 800a3 29 API calls __onexit 97471->97574 97575 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97471->97575 97576 e47d4 256 API calls 97471->97576 97577 e68c1 256 API calls 97471->97577 97475 71376 97474->97475 97476 717b0 97474->97476 97477 b6331 97475->97477 97479 71940 9 API calls 97475->97479 97791 80242 5 API calls __Init_thread_wait 97476->97791 97802 e709c 256 API calls 97477->97802 97482 713a0 97479->97482 97480 717ba 97483 717fb 97480->97483 97792 69cb3 97480->97792 97485 71940 9 API calls 97482->97485 97488 b6346 97483->97488 97490 7182c 97483->97490 97484 b633d 97484->97418 97487 713b6 97485->97487 97487->97483 97489 713ec 97487->97489 97803 d359c 82 API calls __wsopen_s 97488->97803 97489->97488 97513 71408 __fread_nolock 97489->97513 97799 6aceb 23 API calls messages 97490->97799 97493 71839 97800 7d217 256 API calls 97493->97800 97494 717d4 97798 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97494->97798 97497 b636e 97804 d359c 82 API calls __wsopen_s 97497->97804 97499 7152f 97500 b63d1 97499->97500 97501 7153c 97499->97501 97806 e5745 54 API calls _wcslen 97500->97806 97502 71940 9 API calls 97501->97502 97504 71549 97502->97504 97509 71940 9 API calls 97504->97509 97518 715c7 messages 97504->97518 97505 7fddb 22 API calls 97505->97513 97506 7fe0b 22 API calls 97506->97513 97507 71872 97507->97477 97801 7faeb 23 API calls 97507->97801 97517 71563 97509->97517 97510 7171d 97510->97418 97512 6ec40 256 API calls 97512->97513 97513->97493 97513->97497 97513->97499 97513->97505 97513->97506 97513->97512 97515 b63b2 97513->97515 97513->97518 97514 71940 9 API calls 97514->97518 97805 d359c 82 API calls __wsopen_s 97515->97805 97517->97518 97521 6a8c7 22 API calls 97517->97521 97518->97507 97518->97514 97520 7167b messages 97518->97520 97529 64f39 68 API calls 97518->97529 97578 d6ef1 97518->97578 97658 df0ec 97518->97658 97667 e959f 97518->97667 97670 e958b 97518->97670 97673 cd4ce 97518->97673 97676 d744a 97518->97676 97733 7effa 97518->97733 97807 d359c 82 API calls __wsopen_s 97518->97807 97520->97510 97790 7ce17 22 API calls messages 97520->97790 97521->97518 97529->97518 97530->97418 97531->97418 97532->97418 97533->97418 97537 6ec76 messages 97534->97537 97535 80242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97535->97537 97536 7fddb 22 API calls 97536->97537 97537->97535 97537->97536 97538 b4beb 97537->97538 97539 6ed9d messages 97537->97539 97542 b4b0b 97537->97542 97543 6fef7 97537->97543 97544 b4600 97537->97544 97545 6f3ae messages 97537->97545 97551 6a8c7 22 API calls 97537->97551 97552 6fbe3 97537->97552 97553 6a961 22 API calls 97537->97553 97556 800a3 29 API calls pre_c_initialization 97537->97556 97557 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97537->97557 98317 701e0 256 API calls 2 library calls 97537->98317 98318 706a0 41 API calls messages 97537->98318 98322 d359c 82 API calls __wsopen_s 97538->98322 97539->97418 98320 d359c 82 API calls __wsopen_s 97542->98320 97543->97539 97548 6a8c7 22 API calls 97543->97548 97544->97539 97549 6a8c7 22 API calls 97544->97549 97545->97539 98319 d359c 82 API calls __wsopen_s 97545->98319 97548->97539 97549->97539 97551->97537 97552->97539 97552->97545 97554 b4bdc 97552->97554 97553->97537 98321 d359c 82 API calls __wsopen_s 97554->98321 97556->97537 97557->97537 97558->97418 97559->97425 97560->97425 97561->97425 97562->97449 97563->97450 97565 6a8ea __fread_nolock 97564->97565 97566 6a8db 97564->97566 97565->97471 97566->97565 97567 7fe0b 22 API calls 97566->97567 97567->97565 97568->97471 97569->97471 97570->97455 97571->97462 97572->97471 97573->97471 97574->97471 97575->97471 97576->97471 97577->97471 97579 6a961 22 API calls 97578->97579 97580 d6f1d 97579->97580 97581 6a961 22 API calls 97580->97581 97582 d6f26 97581->97582 97583 d6f3a 97582->97583 97994 6b567 97582->97994 97808 67510 97583->97808 97586 d6fbc 97589 67510 53 API calls 97586->97589 97587 d70bf 97590 64ecb 94 API calls 97587->97590 97588 d6f57 _wcslen 97588->97586 97588->97587 97657 d70e9 97588->97657 97591 d6fc8 97589->97591 97592 d70d0 97590->97592 97595 6a8c7 22 API calls 97591->97595 97599 d6fdb 97591->97599 97593 d70e5 97592->97593 97596 64ecb 94 API calls 97592->97596 97594 6a961 22 API calls 97593->97594 97593->97657 97597 d711a 97594->97597 97595->97599 97596->97593 97598 6a961 22 API calls 97597->97598 97602 d7126 97598->97602 97600 d7027 97599->97600 97603 d7005 97599->97603 97607 6a8c7 22 API calls 97599->97607 97601 67510 53 API calls 97600->97601 97605 d7034 97601->97605 97606 6a961 22 API calls 97602->97606 97999 633c6 97603->97999 97609 d703d 97605->97609 97610 d7047 97605->97610 97611 d712f 97606->97611 97607->97603 97608 d700f 97612 67510 53 API calls 97608->97612 97613 6a8c7 22 API calls 97609->97613 98008 ce199 GetFileAttributesW 97610->98008 97615 6a961 22 API calls 97611->97615 97616 d701b 97612->97616 97613->97610 97618 d7138 97615->97618 97619 66350 22 API calls 97616->97619 97617 d7050 97620 d7063 97617->97620 97623 64c6d 22 API calls 97617->97623 97621 67510 53 API calls 97618->97621 97619->97600 97622 67510 53 API calls 97620->97622 97630 d7069 97620->97630 97624 d7145 97621->97624 97626 d70a0 97622->97626 97623->97620 97831 6525f 97624->97831 98009 cd076 57 API calls 97626->98009 97627 d7166 97873 64c6d 97627->97873 97630->97657 97632 d71a9 97634 6a8c7 22 API calls 97632->97634 97633 64c6d 22 API calls 97635 d7186 97633->97635 97636 d71ba 97634->97636 97635->97632 97638 66b57 22 API calls 97635->97638 97876 66350 97636->97876 97641 d719b 97638->97641 97640 66350 22 API calls 97642 d71d6 97640->97642 97643 66b57 22 API calls 97641->97643 97644 66350 22 API calls 97642->97644 97643->97632 97645 d71e4 97644->97645 97646 67510 53 API calls 97645->97646 97647 d71f0 97646->97647 97885 cd7bc 97647->97885 97649 d7201 97650 cd4ce 4 API calls 97649->97650 97651 d720b 97650->97651 97652 67510 53 API calls 97651->97652 97655 d7239 97651->97655 97653 d7229 97652->97653 97939 d2947 97653->97939 97656 64f39 68 API calls 97655->97656 97656->97657 97657->97518 97659 67510 53 API calls 97658->97659 97660 df126 97659->97660 98064 69e90 97660->98064 97662 df136 97663 df15b 97662->97663 97664 6ec40 256 API calls 97662->97664 97666 df15f 97663->97666 98092 69c6e 97663->98092 97664->97663 97666->97518 98118 e7f59 97667->98118 97669 e95af 97669->97518 97671 e7f59 120 API calls 97670->97671 97672 e959b 97671->97672 97672->97518 98210 cdbbe lstrlenW 97673->98210 97677 d7469 97676->97677 97678 d7474 97676->97678 97679 6b567 39 API calls 97677->97679 97680 d7554 97678->97680 97682 6a961 22 API calls 97678->97682 97679->97678 97681 7fddb 22 API calls 97680->97681 97720 d76a4 97680->97720 97683 d7587 97681->97683 97684 d7495 97682->97684 97685 7fe0b 22 API calls 97683->97685 97686 6a961 22 API calls 97684->97686 97687 d7598 97685->97687 97688 d749e 97686->97688 98215 66246 97687->98215 97690 67510 53 API calls 97688->97690 97692 d74aa 97690->97692 97695 6525f 22 API calls 97692->97695 97693 6a961 22 API calls 97694 d75ab 97693->97694 97696 66246 CloseHandle 97694->97696 97697 d74bf 97695->97697 97698 d75b2 97696->97698 97699 66350 22 API calls 97697->97699 97700 67510 53 API calls 97698->97700 97701 d74f2 97699->97701 97702 d75be 97700->97702 97703 d754a 97701->97703 97704 cd4ce 4 API calls 97701->97704 97705 66246 CloseHandle 97702->97705 97708 6b567 39 API calls 97703->97708 97706 d7502 97704->97706 97707 d75c8 97705->97707 97706->97703 97709 d7506 97706->97709 98219 65745 97707->98219 97708->97680 97710 69cb3 22 API calls 97709->97710 97712 d7513 97710->97712 98242 cd2c1 26 API calls 97712->98242 97715 d76de GetLastError 97717 d76f7 97715->97717 97716 d75ea 98227 653de 97716->98227 98246 66216 CloseHandle messages 97717->98246 97720->97518 97721 d751c 97721->97703 97722 d75f8 98243 653c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97722->98243 97724 d75ff 97725 d7645 97724->97725 97727 d7619 97724->97727 97726 7fddb 22 API calls 97725->97726 97728 d7679 97726->97728 98244 cccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97727->98244 97729 6a961 22 API calls 97728->97729 97731 d7686 97729->97731 97731->97720 98245 c417d 22 API calls __fread_nolock 97731->98245 97734 69c6e 22 API calls 97733->97734 97735 7f012 97734->97735 97736 7fddb 22 API calls 97735->97736 97740 bf0a8 97735->97740 97738 7f02b 97736->97738 97739 7fe0b 22 API calls 97738->97739 97741 7f03c 97739->97741 97780 7f0a4 97740->97780 98284 d9caa 39 API calls 97740->98284 97742 66246 CloseHandle 97741->97742 97743 7f047 97742->97743 97745 6a961 22 API calls 97743->97745 97744 6b567 39 API calls 97746 bf10a 97744->97746 97747 7f04f 97745->97747 97748 7f0b1 97746->97748 97749 bf112 97746->97749 97751 66246 CloseHandle 97747->97751 97752 7fa5b 3 API calls 97748->97752 97750 6b567 39 API calls 97749->97750 97756 7f0b8 97750->97756 97753 7f056 97751->97753 97752->97756 97754 67510 53 API calls 97753->97754 97755 7f062 97754->97755 97757 66246 CloseHandle 97755->97757 97759 7f0d3 97756->97759 97760 bf127 97756->97760 97758 7f06c 97757->97758 97761 65745 5 API calls 97758->97761 97762 66270 22 API calls 97759->97762 97763 7fe0b 22 API calls 97760->97763 97764 7f07d 97761->97764 97765 7f0db 97762->97765 97766 bf12c 97763->97766 97767 7f085 97764->97767 97768 bf0a0 97764->97768 98265 7f141 97765->98265 97770 bf140 97766->97770 98285 7f866 ReadFile SetFilePointerEx 97766->98285 97775 653de 27 API calls 97767->97775 98283 66216 CloseHandle messages 97768->98283 97778 bf144 __fread_nolock 97770->97778 98286 d0e85 22 API calls ___scrt_fastfail 97770->98286 97772 7f0ea 97772->97778 98280 662b5 22 API calls 97772->98280 97777 7f093 97775->97777 98279 653c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97777->98279 97780->97744 97780->97748 97781 7f0fe 97784 7f138 97781->97784 97785 66246 CloseHandle 97781->97785 97782 bf069 98282 cccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97782->98282 97783 7f09a 97783->97780 97783->97782 97784->97518 97787 7f12c 97785->97787 97787->97784 98281 66216 CloseHandle messages 97787->98281 97788 bf080 97788->97780 97790->97520 97791->97480 97793 69cc2 _wcslen 97792->97793 97794 7fe0b 22 API calls 97793->97794 97795 69cea __fread_nolock 97794->97795 97796 7fddb 22 API calls 97795->97796 97797 69d00 97796->97797 97797->97494 97798->97483 97799->97493 97800->97507 97801->97507 97802->97484 97803->97518 97804->97518 97805->97518 97806->97517 97807->97518 97809 67525 97808->97809 97824 67522 97808->97824 97810 6752d 97809->97810 97811 6755b 97809->97811 98010 851c6 26 API calls 97810->98010 97813 6756d 97811->97813 97820 a50f6 97811->97820 97823 a500f 97811->97823 98011 7fb21 51 API calls 97813->98011 97815 a510e 97815->97815 97817 6753d 97819 7fddb 22 API calls 97817->97819 97821 67547 97819->97821 98013 85183 26 API calls 97820->98013 97822 69cb3 22 API calls 97821->97822 97822->97824 97825 7fe0b 22 API calls 97823->97825 97830 a5088 97823->97830 97824->97588 97826 a5058 97825->97826 97827 7fddb 22 API calls 97826->97827 97828 a507f 97827->97828 97829 69cb3 22 API calls 97828->97829 97829->97830 98012 7fb21 51 API calls 97830->98012 97832 6a961 22 API calls 97831->97832 97833 65275 97832->97833 97834 6a961 22 API calls 97833->97834 97835 6527d 97834->97835 97836 6a961 22 API calls 97835->97836 97837 65285 97836->97837 97838 6a961 22 API calls 97837->97838 97839 6528d 97838->97839 97840 652c1 97839->97840 97841 a3df5 97839->97841 97842 66d25 22 API calls 97840->97842 97843 6a8c7 22 API calls 97841->97843 97844 652cf 97842->97844 97845 a3dfe 97843->97845 97846 693b2 22 API calls 97844->97846 97847 6a6c3 22 API calls 97845->97847 97848 652d9 97846->97848 97849 65304 97847->97849 97848->97849 97850 66d25 22 API calls 97848->97850 97851 65349 97849->97851 97852 65325 97849->97852 97869 a3e20 97849->97869 97854 652fa 97850->97854 98014 66d25 97851->98014 97852->97851 97857 64c6d 22 API calls 97852->97857 97856 693b2 22 API calls 97854->97856 97855 6535a 97858 65370 97855->97858 97863 6a8c7 22 API calls 97855->97863 97856->97849 97859 65332 97857->97859 97861 65384 97858->97861 97865 6a8c7 22 API calls 97858->97865 97859->97851 97864 66d25 22 API calls 97859->97864 97860 66b57 22 API calls 97870 a3ee0 97860->97870 97862 6538f 97861->97862 97866 6a8c7 22 API calls 97861->97866 97867 6a8c7 22 API calls 97862->97867 97871 6539a 97862->97871 97863->97858 97864->97851 97865->97861 97866->97862 97867->97871 97868 64c6d 22 API calls 97868->97870 97869->97860 97870->97851 97870->97868 98027 649bd 22 API calls __fread_nolock 97870->98027 97871->97627 97874 6aec9 22 API calls 97873->97874 97875 64c78 97874->97875 97875->97632 97875->97633 97877 66362 97876->97877 97878 a4a51 97876->97878 98029 66373 97877->98029 98039 64a88 22 API calls __fread_nolock 97878->98039 97881 6636e 97881->97640 97882 a4a5b 97883 a4a67 97882->97883 97884 6a8c7 22 API calls 97882->97884 97884->97883 97886 cd7d8 97885->97886 97887 cd7dd 97886->97887 97888 cd7f3 97886->97888 97890 6a8c7 22 API calls 97887->97890 97938 cd7ee 97887->97938 97889 6a961 22 API calls 97888->97889 97891 cd7fb 97889->97891 97890->97938 97892 6a961 22 API calls 97891->97892 97893 cd803 97892->97893 97894 6a961 22 API calls 97893->97894 97895 cd80e 97894->97895 97896 6a961 22 API calls 97895->97896 97897 cd816 97896->97897 97898 6a961 22 API calls 97897->97898 97899 cd81e 97898->97899 97900 6a961 22 API calls 97899->97900 97901 cd826 97900->97901 97902 6a961 22 API calls 97901->97902 97903 cd82e 97902->97903 97904 6a961 22 API calls 97903->97904 97905 cd836 97904->97905 97906 6525f 22 API calls 97905->97906 97907 cd84d 97906->97907 97908 6525f 22 API calls 97907->97908 97909 cd866 97908->97909 97910 64c6d 22 API calls 97909->97910 97911 cd872 97910->97911 97912 cd885 97911->97912 97913 693b2 22 API calls 97911->97913 97914 64c6d 22 API calls 97912->97914 97913->97912 97915 cd88e 97914->97915 97916 cd89e 97915->97916 97917 693b2 22 API calls 97915->97917 97918 cd8b0 97916->97918 97919 6a8c7 22 API calls 97916->97919 97917->97916 97920 66350 22 API calls 97918->97920 97919->97918 97921 cd8bb 97920->97921 98045 cd978 22 API calls 97921->98045 97923 cd8ca 98046 cd978 22 API calls 97923->98046 97925 cd8dd 97926 64c6d 22 API calls 97925->97926 97927 cd8e7 97926->97927 97928 cd8ec 97927->97928 97929 cd8fe 97927->97929 97930 633c6 22 API calls 97928->97930 97931 64c6d 22 API calls 97929->97931 97932 cd8f9 97930->97932 97933 cd907 97931->97933 97936 66350 22 API calls 97932->97936 97934 cd925 97933->97934 97935 633c6 22 API calls 97933->97935 97937 66350 22 API calls 97934->97937 97935->97932 97936->97934 97937->97938 97938->97649 97940 d2954 __wsopen_s 97939->97940 97941 7fe0b 22 API calls 97940->97941 97942 d2971 97941->97942 97943 65722 22 API calls 97942->97943 97944 d297b 97943->97944 97945 d274e 27 API calls 97944->97945 97946 d2986 97945->97946 97947 6511f 64 API calls 97946->97947 97948 d299b 97947->97948 97949 d2a6c 97948->97949 97950 d29bf 97948->97950 97951 d2e66 75 API calls 97949->97951 97952 d2e66 75 API calls 97950->97952 97967 d2a38 97951->97967 97953 d29c4 97952->97953 97960 d2a75 messages 97953->97960 98051 8d583 26 API calls 97953->98051 97955 650f5 40 API calls 97956 d2a91 97955->97956 97957 650f5 40 API calls 97956->97957 97959 d2aa1 97957->97959 97958 d29ed 98052 8d583 26 API calls 97958->98052 97961 650f5 40 API calls 97959->97961 97960->97655 97963 d2abc 97961->97963 97964 650f5 40 API calls 97963->97964 97965 d2acc 97964->97965 97966 650f5 40 API calls 97965->97966 97968 d2ae7 97966->97968 97967->97955 97967->97960 97969 650f5 40 API calls 97968->97969 97970 d2af7 97969->97970 97971 650f5 40 API calls 97970->97971 97972 d2b07 97971->97972 97973 650f5 40 API calls 97972->97973 97974 d2b17 97973->97974 98047 d3017 GetTempPathW GetTempFileNameW 97974->98047 97976 d2b22 97977 8e5eb 29 API calls 97976->97977 97987 d2b33 97977->97987 97978 d2bed 97979 8e678 67 API calls 97978->97979 97980 d2bf8 97979->97980 97982 d2bfe DeleteFileW 97980->97982 97983 d2c12 97980->97983 97981 650f5 40 API calls 97981->97987 97982->97960 97984 d2c91 CopyFileW 97983->97984 97990 d2c18 97983->97990 97985 d2cb9 DeleteFileW 97984->97985 97986 d2ca7 DeleteFileW 97984->97986 98048 d2fd8 CreateFileW 97985->98048 97986->97960 97987->97960 97987->97978 97987->97981 97989 8dbb3 65 API calls 97987->97989 97989->97987 97991 d22ce 79 API calls 97990->97991 97992 d2c7c 97991->97992 97992->97985 97993 d2c80 DeleteFileW 97992->97993 97993->97960 97995 6b578 97994->97995 97996 6b57f 97994->97996 97995->97996 98053 862d1 39 API calls _strftime 97995->98053 97996->97583 97998 6b5c2 97998->97583 98000 a30bb 97999->98000 98001 633dd 97999->98001 98003 7fddb 22 API calls 98000->98003 98054 633ee 98001->98054 98005 a30c5 _wcslen 98003->98005 98004 633e8 98004->97608 98006 7fe0b 22 API calls 98005->98006 98007 a30fe __fread_nolock 98006->98007 98008->97617 98009->97630 98010->97817 98011->97817 98012->97820 98013->97815 98015 66d34 98014->98015 98016 66d91 98014->98016 98015->98016 98018 66d3f 98015->98018 98017 693b2 22 API calls 98016->98017 98024 66d62 __fread_nolock 98017->98024 98019 a4c9d 98018->98019 98020 66d5a 98018->98020 98021 7fddb 22 API calls 98019->98021 98028 66f34 22 API calls 98020->98028 98023 a4ca7 98021->98023 98025 7fe0b 22 API calls 98023->98025 98024->97855 98026 a4cda 98025->98026 98027->97870 98028->98024 98030 66382 98029->98030 98035 663b6 __fread_nolock 98029->98035 98031 a4a82 98030->98031 98032 663a9 98030->98032 98030->98035 98034 7fddb 22 API calls 98031->98034 98040 6a587 98032->98040 98036 a4a91 98034->98036 98035->97881 98037 7fe0b 22 API calls 98036->98037 98038 a4ac5 __fread_nolock 98037->98038 98039->97882 98041 6a59d 98040->98041 98044 6a598 __fread_nolock 98040->98044 98042 af80f 98041->98042 98043 7fe0b 22 API calls 98041->98043 98043->98044 98044->98035 98045->97923 98046->97925 98047->97976 98049 d2fff SetFileTime CloseHandle 98048->98049 98050 d3013 98048->98050 98049->98050 98050->97960 98051->97958 98052->97967 98053->97998 98055 633fe _wcslen 98054->98055 98056 a311d 98055->98056 98057 63411 98055->98057 98059 7fddb 22 API calls 98056->98059 98058 6a587 22 API calls 98057->98058 98061 6341e __fread_nolock 98058->98061 98060 a3127 98059->98060 98062 7fe0b 22 API calls 98060->98062 98061->98004 98063 a3157 __fread_nolock 98062->98063 98106 66270 98064->98106 98066 69fd2 98067 6a4a1 22 API calls 98066->98067 98069 69fec 98067->98069 98068 69eb5 98068->98066 98072 af7c4 98068->98072 98073 6a405 98068->98073 98076 6a6c3 22 API calls 98068->98076 98077 af699 98068->98077 98086 6a12c __fread_nolock 98068->98086 98087 6a587 22 API calls 98068->98087 98088 6aec9 22 API calls 98068->98088 98091 6a4a1 22 API calls 98068->98091 98111 64573 41 API calls _wcslen 98068->98111 98113 648c8 23 API calls 98068->98113 98114 649bd 22 API calls __fread_nolock 98068->98114 98115 6a673 22 API calls 98068->98115 98069->97662 98116 c96e2 84 API calls __wsopen_s 98072->98116 98073->98069 98117 c96e2 84 API calls __wsopen_s 98073->98117 98076->98068 98080 7fddb 22 API calls 98077->98080 98079 af7d2 98081 6a4a1 22 API calls 98079->98081 98082 af754 98080->98082 98083 af7e8 98081->98083 98084 7fe0b 22 API calls 98082->98084 98083->98069 98084->98086 98086->98072 98086->98073 98087->98068 98089 6a0db CharUpperBuffW 98088->98089 98112 6a673 22 API calls 98089->98112 98091->98068 98093 69c7e 98092->98093 98094 af545 98092->98094 98099 7fddb 22 API calls 98093->98099 98095 af556 98094->98095 98096 66b57 22 API calls 98094->98096 98097 6a6c3 22 API calls 98095->98097 98096->98095 98098 af560 98097->98098 98098->98098 98100 69c91 98099->98100 98101 69cac 98100->98101 98102 69c9a 98100->98102 98104 6a961 22 API calls 98101->98104 98103 69cb3 22 API calls 98102->98103 98105 69ca2 98103->98105 98104->98105 98105->97666 98107 7fe0b 22 API calls 98106->98107 98108 66295 98107->98108 98109 7fddb 22 API calls 98108->98109 98110 662a3 98109->98110 98110->98068 98111->98068 98112->98068 98113->98068 98114->98068 98115->98068 98116->98079 98117->98069 98119 67510 53 API calls 98118->98119 98120 e7f90 98119->98120 98144 e7fd5 messages 98120->98144 98156 e8cd3 98120->98156 98122 e8281 98123 e844f 98122->98123 98128 e828f 98122->98128 98197 e8ee4 60 API calls 98123->98197 98126 e845e 98127 e846a 98126->98127 98126->98128 98127->98144 98169 e7e86 98128->98169 98129 67510 53 API calls 98146 e8049 98129->98146 98134 e82c8 98184 7fc70 98134->98184 98137 e82e8 98190 d359c 82 API calls __wsopen_s 98137->98190 98138 e8302 98191 663eb 22 API calls 98138->98191 98141 e8311 98192 66a50 22 API calls 98141->98192 98142 e82f3 GetCurrentProcess TerminateProcess 98142->98138 98144->97669 98145 e832a 98155 e8352 98145->98155 98193 704f0 22 API calls 98145->98193 98146->98122 98146->98129 98146->98144 98188 c417d 22 API calls __fread_nolock 98146->98188 98189 e851d 42 API calls _strftime 98146->98189 98148 e84c5 98148->98144 98150 e84d9 FreeLibrary 98148->98150 98149 e8341 98194 e8b7b 75 API calls 98149->98194 98150->98144 98155->98148 98195 704f0 22 API calls 98155->98195 98196 6aceb 23 API calls messages 98155->98196 98198 e8b7b 75 API calls 98155->98198 98157 6aec9 22 API calls 98156->98157 98158 e8cee CharLowerBuffW 98157->98158 98199 c8e54 98158->98199 98162 6a961 22 API calls 98163 e8d2a 98162->98163 98164 66d25 22 API calls 98163->98164 98165 e8d3e 98164->98165 98166 693b2 22 API calls 98165->98166 98168 e8d48 _wcslen 98166->98168 98167 e8e5e _wcslen 98167->98146 98168->98167 98206 e851d 42 API calls _strftime 98168->98206 98170 e7ea1 98169->98170 98174 e7eec 98169->98174 98171 7fe0b 22 API calls 98170->98171 98172 e7ec3 98171->98172 98173 7fddb 22 API calls 98172->98173 98172->98174 98173->98172 98175 e9096 98174->98175 98176 e92ab messages 98175->98176 98183 e90ba _strcat _wcslen 98175->98183 98176->98134 98177 6b6b5 39 API calls 98177->98183 98178 6b567 39 API calls 98178->98183 98179 6b38f 39 API calls 98179->98183 98180 8ea0c 21 API calls ___std_exception_copy 98180->98183 98181 67510 53 API calls 98181->98183 98183->98176 98183->98177 98183->98178 98183->98179 98183->98180 98183->98181 98209 cefae 24 API calls _wcslen 98183->98209 98186 7fc85 98184->98186 98185 7fd1d VirtualAlloc 98187 7fceb 98185->98187 98186->98185 98186->98187 98187->98137 98187->98138 98188->98146 98189->98146 98190->98142 98191->98141 98192->98145 98193->98149 98194->98155 98195->98155 98196->98155 98197->98126 98198->98155 98200 c8e74 _wcslen 98199->98200 98201 c8f63 98200->98201 98202 c8ea9 98200->98202 98205 c8f68 98200->98205 98201->98162 98201->98168 98202->98201 98207 7ce60 41 API calls 98202->98207 98205->98201 98208 7ce60 41 API calls 98205->98208 98206->98167 98207->98202 98208->98205 98209->98183 98211 cdbdc GetFileAttributesW 98210->98211 98213 cd4d5 98210->98213 98212 cdbe8 FindFirstFileW 98211->98212 98211->98213 98212->98213 98214 cdbf9 FindClose 98212->98214 98213->97518 98214->98213 98216 66250 98215->98216 98217 6625f 98215->98217 98216->97693 98217->98216 98218 66264 CloseHandle 98217->98218 98218->98216 98220 6575c CreateFileW 98219->98220 98221 a4035 98219->98221 98224 6577b 98220->98224 98222 a403b CreateFileW 98221->98222 98221->98224 98223 a4063 98222->98223 98222->98224 98247 654c6 98223->98247 98224->97715 98224->97716 98228 653f3 98227->98228 98241 653f0 messages 98227->98241 98229 654c6 3 API calls 98228->98229 98228->98241 98230 65410 98229->98230 98231 a3f4b 98230->98231 98232 6541d 98230->98232 98259 7fa5b 98231->98259 98234 7fe0b 22 API calls 98232->98234 98235 65429 98234->98235 98236 65722 22 API calls 98235->98236 98237 65433 98236->98237 98253 69a40 98237->98253 98240 654c6 3 API calls 98240->98241 98241->97722 98242->97721 98243->97724 98244->97725 98245->97720 98246->97720 98252 654dd 98247->98252 98248 65564 SetFilePointerEx SetFilePointerEx 98250 65530 98248->98250 98249 a3f9c SetFilePointerEx 98250->98224 98251 a3f8b 98251->98249 98252->98248 98252->98249 98252->98250 98252->98251 98254 69abb 98253->98254 98258 69a4e 98253->98258 98264 7e40f SetFilePointerEx 98254->98264 98256 6543f 98256->98240 98257 69a8c ReadFile 98257->98256 98257->98258 98258->98256 98258->98257 98260 654c6 3 API calls 98259->98260 98261 7fa79 98260->98261 98262 654c6 3 API calls 98261->98262 98263 7fa9a 98262->98263 98263->98241 98264->98258 98266 7f14c 98265->98266 98267 7f188 98265->98267 98266->98267 98269 7f15b 98266->98269 98268 6a6c3 22 API calls 98267->98268 98277 ccaeb 98268->98277 98270 7f170 98269->98270 98272 7f17d 98269->98272 98287 7f18e 98270->98287 98294 ccbf2 26 API calls 98272->98294 98273 ccb1a 98273->97772 98275 7f179 98275->97772 98277->98273 98295 cca89 ReadFile SetFilePointerEx 98277->98295 98296 649bd 22 API calls __fread_nolock 98277->98296 98279->97783 98280->97781 98281->97784 98282->97788 98283->97740 98284->97740 98285->97770 98286->97778 98297 7f1d8 98287->98297 98292 7f1c1 98292->98275 98294->98275 98295->98277 98296->98277 98298 7fe0b 22 API calls 98297->98298 98299 7f1ef 98298->98299 98300 7fddb 22 API calls 98299->98300 98301 7f1a6 98300->98301 98302 697b6 98301->98302 98309 69a1e 98302->98309 98304 697fc 98304->98292 98308 66e14 24 API calls 98304->98308 98305 69a40 2 API calls 98306 697c7 98305->98306 98306->98304 98306->98305 98316 69b01 22 API calls __fread_nolock 98306->98316 98308->98292 98310 af378 98309->98310 98311 69a2f 98309->98311 98312 7fddb 22 API calls 98310->98312 98311->98306 98313 af382 98312->98313 98314 7fe0b 22 API calls 98313->98314 98315 af397 98314->98315 98316->98306 98317->97537 98318->97537 98319->97539 98320->97539 98321->97538 98322->97539 98323 61cad SystemParametersInfoW 98324 14f24e0 98338 14f0000 98324->98338 98326 14f25bf 98341 14f2300 98326->98341 98344 14f3620 GetPEB 98338->98344 98340 14f068b 98340->98326 98342 14f230d Sleep 98341->98342 98343 14f231c 98342->98343 98345 14f364a 98344->98345 98345->98340 98346 a2ba5 98347 62b25 98346->98347 98348 a2baf 98346->98348 98374 62b83 7 API calls 98347->98374 98389 63a5a 98348->98389 98352 a2bb8 98354 69cb3 22 API calls 98352->98354 98356 a2bc6 98354->98356 98355 62b2f 98361 62b44 98355->98361 98378 63837 98355->98378 98357 a2bce 98356->98357 98358 a2bf5 98356->98358 98362 633c6 22 API calls 98357->98362 98359 633c6 22 API calls 98358->98359 98363 a2bf1 GetForegroundWindow ShellExecuteW 98359->98363 98366 62b5f 98361->98366 98388 630f2 Shell_NotifyIconW ___scrt_fastfail 98361->98388 98364 a2bd9 98362->98364 98368 a2c26 98363->98368 98367 66350 22 API calls 98364->98367 98372 62b66 SetCurrentDirectoryW 98366->98372 98370 a2be7 98367->98370 98368->98366 98371 633c6 22 API calls 98370->98371 98371->98363 98373 62b7a 98372->98373 98396 62cd4 7 API calls 98374->98396 98376 62b2a 98377 62c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98376->98377 98377->98355 98379 63862 ___scrt_fastfail 98378->98379 98397 64212 98379->98397 98383 63906 Shell_NotifyIconW 98401 63923 98383->98401 98384 a3386 Shell_NotifyIconW 98386 6391c 98386->98361 98387 638e8 98387->98383 98387->98384 98388->98366 98390 a1f50 __wsopen_s 98389->98390 98391 63a67 GetModuleFileNameW 98390->98391 98392 69cb3 22 API calls 98391->98392 98393 63a8d 98392->98393 98394 63aa2 23 API calls 98393->98394 98395 63a97 98394->98395 98395->98352 98396->98376 98398 638b7 98397->98398 98399 a35a4 98397->98399 98398->98387 98423 cc874 42 API calls _strftime 98398->98423 98399->98398 98400 a35ad DestroyIcon 98399->98400 98400->98398 98402 6393f 98401->98402 98420 63a13 98401->98420 98403 66270 22 API calls 98402->98403 98404 6394d 98403->98404 98405 a3393 LoadStringW 98404->98405 98406 6395a 98404->98406 98408 a33ad 98405->98408 98407 66b57 22 API calls 98406->98407 98409 6396f 98407->98409 98412 6a8c7 22 API calls 98408->98412 98422 63994 ___scrt_fastfail 98408->98422 98410 a33c9 98409->98410 98411 6397c 98409->98411 98414 66350 22 API calls 98410->98414 98411->98408 98413 63986 98411->98413 98412->98422 98415 66350 22 API calls 98413->98415 98416 a33d7 98414->98416 98415->98422 98418 633c6 22 API calls 98416->98418 98416->98422 98417 639f9 Shell_NotifyIconW 98417->98420 98419 a33f9 98418->98419 98421 633c6 22 API calls 98419->98421 98420->98386 98421->98422 98422->98417 98423->98387 98424 63156 98427 63170 98424->98427 98428 63187 98427->98428 98429 6318c 98428->98429 98430 631eb 98428->98430 98468 631e9 98428->98468 98431 63265 PostQuitMessage 98429->98431 98432 63199 98429->98432 98434 a2dfb 98430->98434 98435 631f1 98430->98435 98441 6316a 98431->98441 98439 631a4 98432->98439 98440 a2e7c 98432->98440 98433 631d0 DefWindowProcW 98433->98441 98476 618e2 10 API calls 98434->98476 98436 6321d SetTimer RegisterWindowMessageW 98435->98436 98437 631f8 98435->98437 98436->98441 98445 63246 CreatePopupMenu 98436->98445 98442 a2d9c 98437->98442 98443 63201 KillTimer 98437->98443 98446 a2e68 98439->98446 98447 631ae 98439->98447 98481 cbf30 34 API calls ___scrt_fastfail 98440->98481 98455 a2da1 98442->98455 98456 a2dd7 MoveWindow 98442->98456 98472 630f2 Shell_NotifyIconW ___scrt_fastfail 98443->98472 98444 a2e1c 98477 7e499 42 API calls 98444->98477 98445->98441 98480 cc161 27 API calls ___scrt_fastfail 98446->98480 98452 a2e4d 98447->98452 98453 631b9 98447->98453 98452->98433 98479 c0ad7 22 API calls 98452->98479 98459 631c4 98453->98459 98460 63253 98453->98460 98454 a2e8e 98454->98433 98454->98441 98461 a2dc6 SetFocus 98455->98461 98462 a2da7 98455->98462 98456->98441 98457 63214 98473 63c50 DeleteObject DestroyWindow 98457->98473 98458 63263 98458->98441 98459->98433 98478 630f2 Shell_NotifyIconW ___scrt_fastfail 98459->98478 98474 6326f 44 API calls ___scrt_fastfail 98460->98474 98461->98441 98462->98459 98466 a2db0 98462->98466 98475 618e2 10 API calls 98466->98475 98468->98433 98470 a2e41 98471 63837 49 API calls 98470->98471 98471->98468 98472->98457 98473->98441 98474->98458 98475->98441 98476->98444 98477->98459 98478->98470 98479->98468 98480->98458 98481->98454 98482 62e37 98483 6a961 22 API calls 98482->98483 98484 62e4d 98483->98484 98561 64ae3 98484->98561 98486 62e6b 98487 63a5a 24 API calls 98486->98487 98488 62e7f 98487->98488 98489 69cb3 22 API calls 98488->98489 98490 62e8c 98489->98490 98491 64ecb 94 API calls 98490->98491 98492 62ea5 98491->98492 98493 a2cb0 98492->98493 98494 62ead 98492->98494 98495 d2cf9 80 API calls 98493->98495 98497 6a8c7 22 API calls 98494->98497 98496 a2cc3 98495->98496 98498 a2ccf 98496->98498 98500 64f39 68 API calls 98496->98500 98499 62ec3 98497->98499 98503 64f39 68 API calls 98498->98503 98575 66f88 22 API calls 98499->98575 98500->98498 98502 62ecf 98504 69cb3 22 API calls 98502->98504 98505 a2ce5 98503->98505 98506 62edc 98504->98506 98591 63084 22 API calls 98505->98591 98576 6a81b 41 API calls 98506->98576 98509 62eec 98511 69cb3 22 API calls 98509->98511 98510 a2d02 98592 63084 22 API calls 98510->98592 98513 62f12 98511->98513 98577 6a81b 41 API calls 98513->98577 98514 a2d1e 98516 63a5a 24 API calls 98514->98516 98518 a2d44 98516->98518 98517 62f21 98520 6a961 22 API calls 98517->98520 98593 63084 22 API calls 98518->98593 98522 62f3f 98520->98522 98521 a2d50 98523 6a8c7 22 API calls 98521->98523 98578 63084 22 API calls 98522->98578 98525 a2d5e 98523->98525 98594 63084 22 API calls 98525->98594 98527 62f4b 98579 84a28 40 API calls 3 library calls 98527->98579 98528 a2d6d 98532 6a8c7 22 API calls 98528->98532 98530 62f59 98530->98505 98531 62f63 98530->98531 98580 84a28 40 API calls 3 library calls 98531->98580 98534 a2d83 98532->98534 98595 63084 22 API calls 98534->98595 98535 62f6e 98535->98510 98537 62f78 98535->98537 98581 84a28 40 API calls 3 library calls 98537->98581 98538 a2d90 98540 62f83 98540->98514 98541 62f8d 98540->98541 98582 84a28 40 API calls 3 library calls 98541->98582 98543 62f98 98544 62fdc 98543->98544 98583 63084 22 API calls 98543->98583 98544->98528 98545 62fe8 98544->98545 98545->98538 98585 663eb 22 API calls 98545->98585 98547 62fbf 98549 6a8c7 22 API calls 98547->98549 98551 62fcd 98549->98551 98550 62ff8 98586 66a50 22 API calls 98550->98586 98584 63084 22 API calls 98551->98584 98554 63006 98587 670b0 23 API calls 98554->98587 98558 63021 98559 63065 98558->98559 98588 66f88 22 API calls 98558->98588 98589 670b0 23 API calls 98558->98589 98590 63084 22 API calls 98558->98590 98562 64af0 __wsopen_s 98561->98562 98563 66b57 22 API calls 98562->98563 98564 64b22 98562->98564 98563->98564 98565 64c6d 22 API calls 98564->98565 98573 64b58 98564->98573 98565->98564 98566 64c6d 22 API calls 98566->98573 98567 69cb3 22 API calls 98569 64c52 98567->98569 98568 69cb3 22 API calls 98568->98573 98570 6515f 22 API calls 98569->98570 98572 64c5e 98570->98572 98571 6515f 22 API calls 98571->98573 98572->98486 98573->98566 98573->98568 98573->98571 98574 64c29 98573->98574 98574->98567 98574->98572 98575->98502 98576->98509 98577->98517 98578->98527 98579->98530 98580->98535 98581->98540 98582->98543 98583->98547 98584->98544 98585->98550 98586->98554 98587->98558 98588->98558 98589->98558 98590->98558 98591->98510 98592->98514 98593->98521 98594->98528 98595->98538 98596 990fa 98597 99107 98596->98597 98601 9911f 98596->98601 98646 8f2d9 20 API calls __dosmaperr 98597->98646 98599 9910c 98647 927ec 26 API calls ___std_exception_copy 98599->98647 98602 99117 98601->98602 98603 9917a 98601->98603 98648 9fdc4 21 API calls 2 library calls 98601->98648 98605 8d955 __fread_nolock 26 API calls 98603->98605 98606 99192 98605->98606 98616 98c32 98606->98616 98608 99199 98608->98602 98609 8d955 __fread_nolock 26 API calls 98608->98609 98610 991c5 98609->98610 98610->98602 98611 8d955 __fread_nolock 26 API calls 98610->98611 98612 991d3 98611->98612 98612->98602 98613 8d955 __fread_nolock 26 API calls 98612->98613 98614 991e3 98613->98614 98615 8d955 __fread_nolock 26 API calls 98614->98615 98615->98602 98617 98c3e CallCatchBlock 98616->98617 98618 98c5e 98617->98618 98619 98c46 98617->98619 98621 98d24 98618->98621 98626 98c97 98618->98626 98650 8f2c6 20 API calls __dosmaperr 98619->98650 98657 8f2c6 20 API calls __dosmaperr 98621->98657 98623 98c4b 98651 8f2d9 20 API calls __dosmaperr 98623->98651 98624 98d29 98658 8f2d9 20 API calls __dosmaperr 98624->98658 98628 98cbb 98626->98628 98629 98ca6 98626->98629 98649 95147 EnterCriticalSection 98628->98649 98652 8f2c6 20 API calls __dosmaperr 98629->98652 98632 98cb3 98659 927ec 26 API calls ___std_exception_copy 98632->98659 98633 98cab 98653 8f2d9 20 API calls __dosmaperr 98633->98653 98634 98cc1 98636 98cdd 98634->98636 98637 98cf2 98634->98637 98654 8f2d9 20 API calls __dosmaperr 98636->98654 98641 98d45 __fread_nolock 38 API calls 98637->98641 98639 98c53 __wsopen_s 98639->98608 98643 98ced 98641->98643 98642 98ce2 98655 8f2c6 20 API calls __dosmaperr 98642->98655 98656 98d1c LeaveCriticalSection __wsopen_s 98643->98656 98646->98599 98647->98602 98648->98603 98649->98634 98650->98623 98651->98639 98652->98633 98653->98632 98654->98642 98655->98643 98656->98639 98657->98624 98658->98632 98659->98639 98660 803fb 98661 80407 CallCatchBlock 98660->98661 98689 7feb1 98661->98689 98663 8040e 98664 80561 98663->98664 98667 80438 98663->98667 98716 8083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98664->98716 98666 80568 98717 84e52 28 API calls _abort 98666->98717 98669 80477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98667->98669 98700 9247d 98667->98700 98677 804d8 98669->98677 98712 84e1a 38 API calls 3 library calls 98669->98712 98670 8056e 98718 84e04 28 API calls _abort 98670->98718 98674 80576 98675 80457 98708 80959 98677->98708 98680 804de 98681 804f3 98680->98681 98713 80992 GetModuleHandleW 98681->98713 98683 804fa 98683->98666 98684 804fe 98683->98684 98685 80507 98684->98685 98714 84df5 28 API calls _abort 98684->98714 98715 80040 13 API calls 2 library calls 98685->98715 98688 8050f 98688->98675 98690 7feba 98689->98690 98719 80698 IsProcessorFeaturePresent 98690->98719 98692 7fec6 98720 82c94 10 API calls 3 library calls 98692->98720 98694 7fecb 98699 7fecf 98694->98699 98721 92317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98694->98721 98696 7fed8 98697 7fee6 98696->98697 98722 82cbd 8 API calls 3 library calls 98696->98722 98697->98663 98699->98663 98702 92494 98700->98702 98701 80a8c CatchGuardHandler 5 API calls 98703 80451 98701->98703 98702->98701 98703->98675 98704 92421 98703->98704 98705 92450 98704->98705 98706 80a8c CatchGuardHandler 5 API calls 98705->98706 98707 92479 98706->98707 98707->98669 98723 82340 98708->98723 98710 8096c GetStartupInfoW 98711 8097f 98710->98711 98711->98680 98712->98677 98713->98683 98714->98685 98715->98688 98716->98666 98717->98670 98718->98674 98719->98692 98720->98694 98721->98696 98722->98699 98724 82357 98723->98724 98724->98710 98724->98724 98725 61033 98730 64c91 98725->98730 98729 61042 98731 6a961 22 API calls 98730->98731 98732 64cff 98731->98732 98738 63af0 98732->98738 98734 64d9c 98735 61038 98734->98735 98741 651f7 22 API calls __fread_nolock 98734->98741 98737 800a3 29 API calls __onexit 98735->98737 98737->98729 98742 63b1c 98738->98742 98741->98734 98743 63b0f 98742->98743 98744 63b29 98742->98744 98743->98734 98744->98743 98745 63b30 RegOpenKeyExW 98744->98745 98745->98743 98746 63b4a RegQueryValueExW 98745->98746 98747 63b80 RegCloseKey 98746->98747 98748 63b6b 98746->98748 98747->98743 98748->98747 98749 6f7bf 98750 6fcb6 98749->98750 98751 6f7d3 98749->98751 98786 6aceb 23 API calls messages 98750->98786 98752 6fcc2 98751->98752 98754 7fddb 22 API calls 98751->98754 98787 6aceb 23 API calls messages 98752->98787 98756 6f7e5 98754->98756 98756->98752 98757 6f83e 98756->98757 98758 6fd3d 98756->98758 98760 71310 256 API calls 98757->98760 98775 6ed9d messages 98757->98775 98788 d1155 22 API calls 98758->98788 98781 6ec76 messages 98760->98781 98761 7fddb 22 API calls 98761->98781 98763 6fef7 98769 6a8c7 22 API calls 98763->98769 98763->98775 98765 b4b0b 98790 d359c 82 API calls __wsopen_s 98765->98790 98766 b4600 98770 6a8c7 22 API calls 98766->98770 98766->98775 98769->98775 98770->98775 98772 80242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98772->98781 98773 6a8c7 22 API calls 98773->98781 98774 6fbe3 98774->98775 98777 b4bdc 98774->98777 98782 6f3ae messages 98774->98782 98776 6a961 22 API calls 98776->98781 98791 d359c 82 API calls __wsopen_s 98777->98791 98779 b4beb 98792 d359c 82 API calls __wsopen_s 98779->98792 98780 800a3 29 API calls pre_c_initialization 98780->98781 98781->98761 98781->98763 98781->98765 98781->98766 98781->98772 98781->98773 98781->98774 98781->98775 98781->98776 98781->98779 98781->98780 98781->98782 98783 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98781->98783 98784 701e0 256 API calls 2 library calls 98781->98784 98785 706a0 41 API calls messages 98781->98785 98782->98775 98789 d359c 82 API calls __wsopen_s 98782->98789 98783->98781 98784->98781 98785->98781 98786->98752 98787->98758 98788->98775 98789->98775 98790->98775 98791->98779 98792->98775 98793 6dddc 98796 6b710 98793->98796 98797 6b72b 98796->98797 98798 b00f8 98797->98798 98799 b0146 98797->98799 98819 6b750 98797->98819 98802 b0102 98798->98802 98805 b010f 98798->98805 98798->98819 98838 e58a2 256 API calls 2 library calls 98799->98838 98836 e5d33 256 API calls 98802->98836 98818 6ba20 98805->98818 98837 e61d0 256 API calls 2 library calls 98805->98837 98808 b03d9 98808->98808 98810 6bbe0 40 API calls 98810->98819 98813 6ba4e 98814 b0322 98841 e5c0c 82 API calls 98814->98841 98818->98813 98842 d359c 82 API calls __wsopen_s 98818->98842 98819->98810 98819->98813 98819->98814 98819->98818 98823 7d336 40 API calls 98819->98823 98824 6ec40 256 API calls 98819->98824 98825 6a8c7 22 API calls 98819->98825 98827 6a81b 41 API calls 98819->98827 98828 7d2f0 40 API calls 98819->98828 98829 7a01b 256 API calls 98819->98829 98830 80242 5 API calls __Init_thread_wait 98819->98830 98831 7edcd 22 API calls 98819->98831 98832 800a3 29 API calls __onexit 98819->98832 98833 801f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98819->98833 98834 7ee53 82 API calls 98819->98834 98835 7e5ca 256 API calls 98819->98835 98839 6aceb 23 API calls messages 98819->98839 98840 bf6bf 23 API calls 98819->98840 98823->98819 98824->98819 98825->98819 98827->98819 98828->98819 98829->98819 98830->98819 98831->98819 98832->98819 98833->98819 98834->98819 98835->98819 98836->98805 98837->98818 98838->98819 98839->98819 98840->98819 98841->98818 98842->98808 98843 6105b 98848 6344d 98843->98848 98845 6106a 98879 800a3 29 API calls __onexit 98845->98879 98847 61074 98849 6345d __wsopen_s 98848->98849 98850 6a961 22 API calls 98849->98850 98851 63513 98850->98851 98852 63a5a 24 API calls 98851->98852 98853 6351c 98852->98853 98880 63357 98853->98880 98856 633c6 22 API calls 98857 63535 98856->98857 98858 6515f 22 API calls 98857->98858 98859 63544 98858->98859 98860 6a961 22 API calls 98859->98860 98861 6354d 98860->98861 98862 6a6c3 22 API calls 98861->98862 98863 63556 RegOpenKeyExW 98862->98863 98864 a3176 RegQueryValueExW 98863->98864 98869 63578 98863->98869 98865 a320c RegCloseKey 98864->98865 98866 a3193 98864->98866 98865->98869 98878 a321e _wcslen 98865->98878 98867 7fe0b 22 API calls 98866->98867 98868 a31ac 98867->98868 98871 65722 22 API calls 98868->98871 98869->98845 98870 64c6d 22 API calls 98870->98878 98872 a31b7 RegQueryValueExW 98871->98872 98873 a31d4 98872->98873 98875 a31ee messages 98872->98875 98874 66b57 22 API calls 98873->98874 98874->98875 98875->98865 98876 69cb3 22 API calls 98876->98878 98877 6515f 22 API calls 98877->98878 98878->98869 98878->98870 98878->98876 98878->98877 98879->98847 98881 a1f50 __wsopen_s 98880->98881 98882 63364 GetFullPathNameW 98881->98882 98883 63386 98882->98883 98884 66b57 22 API calls 98883->98884 98885 633a4 98884->98885 98885->98856 98886 61098 98891 642de 98886->98891 98890 610a7 98892 6a961 22 API calls 98891->98892 98893 642f5 GetVersionExW 98892->98893 98894 66b57 22 API calls 98893->98894 98895 64342 98894->98895 98896 693b2 22 API calls 98895->98896 98898 64378 98895->98898 98897 6436c 98896->98897 98900 637a0 22 API calls 98897->98900 98899 6441b GetCurrentProcess IsWow64Process 98898->98899 98906 a37df 98898->98906 98901 64437 98899->98901 98900->98898 98902 6444f LoadLibraryA 98901->98902 98903 a3824 GetSystemInfo 98901->98903 98904 64460 GetProcAddress 98902->98904 98905 6449c GetSystemInfo 98902->98905 98904->98905 98907 64470 GetNativeSystemInfo 98904->98907 98908 64476 98905->98908 98907->98908 98909 6109d 98908->98909 98910 6447a FreeLibrary 98908->98910 98911 800a3 29 API calls __onexit 98909->98911 98910->98909 98911->98890

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 234 642de-6434d call 6a961 GetVersionExW call 66b57 239 64353 234->239 240 a3617-a362a 234->240 241 64355-64357 239->241 242 a362b-a362f 240->242 245 6435d-643bc call 693b2 call 637a0 241->245 246 a3656 241->246 243 a3632-a363e 242->243 244 a3631 242->244 243->242 247 a3640-a3642 243->247 244->243 263 643c2-643c4 245->263 264 a37df-a37e6 245->264 250 a365d-a3660 246->250 247->241 249 a3648-a364f 247->249 249->240 252 a3651 249->252 253 a3666-a36a8 250->253 254 6441b-64435 GetCurrentProcess IsWow64Process 250->254 252->246 253->254 258 a36ae-a36b1 253->258 256 64437 254->256 257 64494-6449a 254->257 260 6443d-64449 256->260 257->260 261 a36db-a36e5 258->261 262 a36b3-a36bd 258->262 265 6444f-6445e LoadLibraryA 260->265 266 a3824-a3828 GetSystemInfo 260->266 270 a36f8-a3702 261->270 271 a36e7-a36f3 261->271 267 a36ca-a36d6 262->267 268 a36bf-a36c5 262->268 263->250 269 643ca-643dd 263->269 272 a37e8 264->272 273 a3806-a3809 264->273 279 64460-6446e GetProcAddress 265->279 280 6449c-644a6 GetSystemInfo 265->280 267->254 268->254 281 643e3-643e5 269->281 282 a3726-a372f 269->282 275 a3704-a3710 270->275 276 a3715-a3721 270->276 271->254 274 a37ee 272->274 277 a380b-a381a 273->277 278 a37f4-a37fc 273->278 274->278 275->254 276->254 277->274 287 a381c-a3822 277->287 278->273 279->280 288 64470-64474 GetNativeSystemInfo 279->288 289 64476-64478 280->289 283 a374d-a3762 281->283 284 643eb-643ee 281->284 285 a373c-a3748 282->285 286 a3731-a3737 282->286 292 a376f-a377b 283->292 293 a3764-a376a 283->293 290 643f4-6440f 284->290 291 a3791-a3794 284->291 285->254 286->254 287->278 288->289 294 64481-64493 289->294 295 6447a-6447b FreeLibrary 289->295 296 64415 290->296 297 a3780-a378c 290->297 291->254 298 a379a-a37c1 291->298 292->254 293->254 295->294 296->254 297->254 299 a37ce-a37da 298->299 300 a37c3-a37c9 298->300 299->254 300->254
                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 0006430D
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          • GetCurrentProcess.KERNEL32(?,000FCB64,00000000,?,?), ref: 00064422
                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00064429
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00064454
                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00064466
                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00064474
                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0006447B
                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 000644A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                          • API String ID: 3290436268-3101561225
                                          • Opcode ID: 8b599484bb2bf9591ef3fb18f2395f0aa92ecacd85e3bfe5eaeb8ce81fd8f349
                                          • Instruction ID: c6359a1f82cf08c9295fbc6271acf4550ce653ec4f2e099f55adde3b5abd5ba0
                                          • Opcode Fuzzy Hash: 8b599484bb2bf9591ef3fb18f2395f0aa92ecacd85e3bfe5eaeb8ce81fd8f349
                                          • Instruction Fuzzy Hash: C2A1956290E3C4FFDB21C7AA7C425E97FE57B27360B089899E04197F22D63445C8DB21

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 661 642a2-642ba CreateStreamOnHGlobal 662 642bc-642d3 FindResourceExW 661->662 663 642da-642dd 661->663 664 a35ba-a35c9 LoadResource 662->664 665 642d9 662->665 664->665 666 a35cf-a35dd SizeofResource 664->666 665->663 666->665 667 a35e3-a35ee LockResource 666->667 667->665 668 a35f4-a3612 667->668 668->665
                                          APIs
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,000650AA,?,?,00000000,00000000), ref: 000642B2
                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,000650AA,?,?,00000000,00000000), ref: 000642C9
                                          • LoadResource.KERNEL32(?,00000000,?,?,000650AA,?,?,00000000,00000000,?,?,?,?,?,?,00064F20), ref: 000A35BE
                                          • SizeofResource.KERNEL32(?,00000000,?,?,000650AA,?,?,00000000,00000000,?,?,?,?,?,?,00064F20), ref: 000A35D3
                                          • LockResource.KERNEL32(000650AA,?,?,000650AA,?,?,00000000,00000000,?,?,?,?,?,?,00064F20,?), ref: 000A35E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                          • String ID: SCRIPT
                                          • API String ID: 3051347437-3967369404
                                          • Opcode ID: 2a4ca5d373e7583968060b8d87c8a25dddc7a4fa1b4110980ceb43cc9023bdc7
                                          • Instruction ID: e2539644af72f15dff569fe1b50a9fe29805b8d65a7cc6cb7eb380a800419acb
                                          • Opcode Fuzzy Hash: 2a4ca5d373e7583968060b8d87c8a25dddc7a4fa1b4110980ceb43cc9023bdc7
                                          • Instruction Fuzzy Hash: 10117C70600705BFE7218BA5DD59F277BBAEFC5B51F204169F502D6650DB71DC10D620

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1435 a2ba5-a2ba9 1436 62b25-62b3b call 62b83 call 62c63 1435->1436 1437 a2baf-a2bcc call 63a5a call 69cb3 1435->1437 1446 62b44-62b4a call 6d760 1436->1446 1447 62b3d-62b3f call 63837 1436->1447 1448 a2bce-a2bf3 call 633c6 call 66350 call 633c6 1437->1448 1449 a2bf5-a2bfd call 633c6 1437->1449 1455 62b4f-62b56 1446->1455 1447->1446 1457 a2bfe-a2c26 GetForegroundWindow ShellExecuteW call 6988f 1448->1457 1449->1457 1458 62b5f-62b80 call 63d1b SetCurrentDirectoryW call 6988f 1455->1458 1459 62b58-62b5a call 630f2 1455->1459 1457->1458 1459->1458
                                          APIs
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00062B6B
                                            • Part of subcall function 00063A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00131418,?,00062E7F,?,?,?,00000000), ref: 00063A78
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00122224), ref: 000A2C10
                                          • ShellExecuteW.SHELL32(00000000,?,?,00122224), ref: 000A2C17
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                          • String ID: runas
                                          • API String ID: 448630720-4000483414
                                          • Opcode ID: 5d869aca280e8e29fac6efce2e81aa949d7fc88bbca41ad77f5fa8598bfae7a0
                                          • Instruction ID: 1f2526f55df31a70251de8b92e99a578934708b2c60dbb055270adbc58abcd53
                                          • Opcode Fuzzy Hash: 5d869aca280e8e29fac6efce2e81aa949d7fc88bbca41ad77f5fa8598bfae7a0
                                          • Instruction Fuzzy Hash: 3711D031208345AAD714FF64E992DFEB7ABEB91350F44242DF082631A3CF358A49D752
                                          APIs
                                          • lstrlenW.KERNEL32(?,000A5222), ref: 000CDBCE
                                          • GetFileAttributesW.KERNELBASE(?), ref: 000CDBDD
                                          • FindFirstFileW.KERNELBASE(?,?), ref: 000CDBEE
                                          • FindClose.KERNEL32(00000000), ref: 000CDBFA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                          • String ID:
                                          • API String ID: 2695905019-0
                                          • Opcode ID: 591735301761d066620ae417100c2a2dfa168140172e7b3a17932b33a26ec48f
                                          • Instruction ID: 6f767ab30114d38744b3bc4a2d8ef3f633eef9a38828fe363c56c58aff1a79eb
                                          • Opcode Fuzzy Hash: 591735301761d066620ae417100c2a2dfa168140172e7b3a17932b33a26ec48f
                                          • Instruction Fuzzy Hash: 76F0A03081091997A2206B78AE4EDBE37AC9F42334B10471BF836C24E0EBB46D54D695
                                          APIs
                                          • GetInputState.USER32 ref: 0006D807
                                          • timeGetTime.WINMM ref: 0006DA07
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0006DB28
                                          • TranslateMessage.USER32(?), ref: 0006DB7B
                                          • DispatchMessageW.USER32(?), ref: 0006DB89
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0006DB9F
                                          • Sleep.KERNEL32(0000000A), ref: 0006DBB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                          • String ID:
                                          • API String ID: 2189390790-0
                                          • Opcode ID: 1e66d342dd3a33540984a3aaf7a7b27cdf5b2ee6e395c1f7c0bac50ff7c6aad0
                                          • Instruction ID: 2aff4dbb402eb4f464dec889ccb07b51f91aa032e7b505c1767939863464e60f
                                          • Opcode Fuzzy Hash: 1e66d342dd3a33540984a3aaf7a7b27cdf5b2ee6e395c1f7c0bac50ff7c6aad0
                                          • Instruction Fuzzy Hash: D542CF30A08342EFE778DF24C895BEABBE2BF45314F14855EE45587292D774E884CB92

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00062D07
                                          • RegisterClassExW.USER32(00000030), ref: 00062D31
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00062D42
                                          • InitCommonControlsEx.COMCTL32(?), ref: 00062D5F
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00062D6F
                                          • LoadIconW.USER32(000000A9), ref: 00062D85
                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00062D94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: 26dd48e92892e5d5951564e612277ee86ca950ce4d55417a764c2c44113b5183
                                          • Instruction ID: d8d36a910b84bf86fa48a31c86953110f8d03bdb1c6fe08f612a6cb12dbcd1ba
                                          • Opcode Fuzzy Hash: 26dd48e92892e5d5951564e612277ee86ca950ce4d55417a764c2c44113b5183
                                          • Instruction Fuzzy Hash: D521E5B190130CEFEB00DFA4E94ABEDBBB4FB08714F00411AF611A66A0D7B91584DF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 302 a065b-a068b call a042f 305 a068d-a0698 call 8f2c6 302->305 306 a06a6-a06b2 call 95221 302->306 313 a069a-a06a1 call 8f2d9 305->313 311 a06cb-a0714 call a039a 306->311 312 a06b4-a06c9 call 8f2c6 call 8f2d9 306->312 322 a0781-a078a GetFileType 311->322 323 a0716-a071f 311->323 312->313 320 a097d-a0983 313->320 324 a078c-a07bd GetLastError call 8f2a3 CloseHandle 322->324 325 a07d3-a07d6 322->325 327 a0721-a0725 323->327 328 a0756-a077c GetLastError call 8f2a3 323->328 324->313 341 a07c3-a07ce call 8f2d9 324->341 331 a07d8-a07dd 325->331 332 a07df-a07e5 325->332 327->328 333 a0727-a0754 call a039a 327->333 328->313 336 a07e9-a0837 call 9516a 331->336 332->336 337 a07e7 332->337 333->322 333->328 344 a0839-a0845 call a05ab 336->344 345 a0847-a086b call a014d 336->345 337->336 341->313 344->345 351 a086f-a0879 call 986ae 344->351 352 a087e-a08c1 345->352 353 a086d 345->353 351->320 355 a08e2-a08f0 352->355 356 a08c3-a08c7 352->356 353->351 357 a097b 355->357 358 a08f6-a08fa 355->358 356->355 360 a08c9-a08dd 356->360 357->320 358->357 361 a08fc-a092f CloseHandle call a039a 358->361 360->355 364 a0963-a0977 361->364 365 a0931-a095d GetLastError call 8f2a3 call 95333 361->365 364->357 365->364
                                          APIs
                                            • Part of subcall function 000A039A: CreateFileW.KERNELBASE(00000000,00000000,?,000A0704,?,?,00000000,?,000A0704,00000000,0000000C), ref: 000A03B7
                                          • GetLastError.KERNEL32 ref: 000A076F
                                          • __dosmaperr.LIBCMT ref: 000A0776
                                          • GetFileType.KERNELBASE(00000000), ref: 000A0782
                                          • GetLastError.KERNEL32 ref: 000A078C
                                          • __dosmaperr.LIBCMT ref: 000A0795
                                          • CloseHandle.KERNEL32(00000000), ref: 000A07B5
                                          • CloseHandle.KERNEL32(?), ref: 000A08FF
                                          • GetLastError.KERNEL32 ref: 000A0931
                                          • __dosmaperr.LIBCMT ref: 000A0938
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: a999af693105eb449328c735bb3cff253d57066c5432399703a9b1b6d299df9a
                                          • Instruction ID: b1469f564de403fbac038a1e9673a1aad26c6eb2645f121a277913fe7318ba78
                                          • Opcode Fuzzy Hash: a999af693105eb449328c735bb3cff253d57066c5432399703a9b1b6d299df9a
                                          • Instruction Fuzzy Hash: D9A12632A041098FDF19AFB8DC52BAE3BE4AB0B320F140159F855DB292DB359D12DB91

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00063A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00131418,?,00062E7F,?,?,?,00000000), ref: 00063A78
                                            • Part of subcall function 00063357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00063379
                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0006356A
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 000A318D
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 000A31CE
                                          • RegCloseKey.ADVAPI32(?), ref: 000A3210
                                          • _wcslen.LIBCMT ref: 000A3277
                                          • _wcslen.LIBCMT ref: 000A3286
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                          • API String ID: 98802146-2727554177
                                          • Opcode ID: 88f59b3d20d1f92fe300579965f040f6b9ef2b1aa3abf2b18d8b50973d878661
                                          • Instruction ID: 98b8aecdd0f28912988c2c8cf32993ed1a29b32057b10239b3f56ac054ff559c
                                          • Opcode Fuzzy Hash: 88f59b3d20d1f92fe300579965f040f6b9ef2b1aa3abf2b18d8b50973d878661
                                          • Instruction Fuzzy Hash: C971D1715043059ED314FF65EC82DABBBE8FF89350F40042EF585975A1EB349A88CB62

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00062B8E
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00062B9D
                                          • LoadIconW.USER32(00000063), ref: 00062BB3
                                          • LoadIconW.USER32(000000A4), ref: 00062BC5
                                          • LoadIconW.USER32(000000A2), ref: 00062BD7
                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00062BEF
                                          • RegisterClassExW.USER32(?), ref: 00062C40
                                            • Part of subcall function 00062CD4: GetSysColorBrush.USER32(0000000F), ref: 00062D07
                                            • Part of subcall function 00062CD4: RegisterClassExW.USER32(00000030), ref: 00062D31
                                            • Part of subcall function 00062CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00062D42
                                            • Part of subcall function 00062CD4: InitCommonControlsEx.COMCTL32(?), ref: 00062D5F
                                            • Part of subcall function 00062CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00062D6F
                                            • Part of subcall function 00062CD4: LoadIconW.USER32(000000A9), ref: 00062D85
                                            • Part of subcall function 00062CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00062D94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                          • String ID: #$0$AutoIt v3
                                          • API String ID: 423443420-4155596026
                                          • Opcode ID: 00c8e786db7e40c4eeacb95750e5d3dfca4e5e5866fa754167cf913a3a21b574
                                          • Instruction ID: dfa93bb7c03da94197192668eccb04794364d0a6a92331c07058fc0cc59ceddb
                                          • Opcode Fuzzy Hash: 00c8e786db7e40c4eeacb95750e5d3dfca4e5e5866fa754167cf913a3a21b574
                                          • Instruction Fuzzy Hash: 89212C71E00318BBEB109FA6ED55AA97FB5FB48B60F00001AE504A6AA0D7B51584DF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 443 63170-63185 444 63187-6318a 443->444 445 631e5-631e7 443->445 446 6318c-63193 444->446 447 631eb 444->447 445->444 448 631e9 445->448 449 63265-6326d PostQuitMessage 446->449 450 63199-6319e 446->450 452 a2dfb-a2e23 call 618e2 call 7e499 447->452 453 631f1-631f6 447->453 451 631d0-631d8 DefWindowProcW 448->451 460 63219-6321b 449->460 457 631a4-631a8 450->457 458 a2e7c-a2e90 call cbf30 450->458 459 631de-631e4 451->459 488 a2e28-a2e2f 452->488 454 6321d-63244 SetTimer RegisterWindowMessageW 453->454 455 631f8-631fb 453->455 454->460 464 63246-63251 CreatePopupMenu 454->464 461 a2d9c-a2d9f 455->461 462 63201-63214 KillTimer call 630f2 call 63c50 455->462 465 a2e68-a2e77 call cc161 457->465 466 631ae-631b3 457->466 458->460 482 a2e96 458->482 460->459 474 a2da1-a2da5 461->474 475 a2dd7-a2df6 MoveWindow 461->475 462->460 464->460 465->460 471 a2e4d-a2e54 466->471 472 631b9-631be 466->472 471->451 476 a2e5a-a2e63 call c0ad7 471->476 480 631c4-631ca 472->480 481 63253-63263 call 6326f 472->481 483 a2dc6-a2dd2 SetFocus 474->483 484 a2da7-a2daa 474->484 475->460 476->451 480->451 480->488 481->460 482->451 483->460 484->480 489 a2db0-a2dc1 call 618e2 484->489 488->451 493 a2e35-a2e48 call 630f2 call 63837 488->493 489->460 493->451
                                          APIs
                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0006316A,?,?), ref: 000631D8
                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0006316A,?,?), ref: 00063204
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00063227
                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0006316A,?,?), ref: 00063232
                                          • CreatePopupMenu.USER32 ref: 00063246
                                          • PostQuitMessage.USER32(00000000), ref: 00063267
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                          • String ID: TaskbarCreated
                                          • API String ID: 129472671-2362178303
                                          • Opcode ID: 0b6490b7f52f96c25ba7c7a78b003051af4f95b2c34ab536e53041048bbf4c03
                                          • Instruction ID: 9186eeb6fc40990bc4019ef443752a2ce1e23e2339f38e3fb43af4861f302d8e
                                          • Opcode Fuzzy Hash: 0b6490b7f52f96c25ba7c7a78b003051af4f95b2c34ab536e53041048bbf4c03
                                          • Instruction Fuzzy Hash: 24410E31244205B7EB246B78DD5EBBD3A9BEB07354F040125F901DA592C7759A80D7E1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 499 98d45-98d55 500 98d6f-98d71 499->500 501 98d57-98d6a call 8f2c6 call 8f2d9 499->501 503 990d9-990e6 call 8f2c6 call 8f2d9 500->503 504 98d77-98d7d 500->504 517 990f1 501->517 522 990ec call 927ec 503->522 504->503 507 98d83-98dae 504->507 507->503 510 98db4-98dbd 507->510 513 98dbf-98dd2 call 8f2c6 call 8f2d9 510->513 514 98dd7-98dd9 510->514 513->522 515 98ddf-98de3 514->515 516 990d5-990d7 514->516 515->516 520 98de9-98ded 515->520 521 990f4-990f9 516->521 517->521 520->513 524 98def-98e06 520->524 522->517 527 98e08-98e0b 524->527 528 98e23-98e2c 524->528 530 98e0d-98e13 527->530 531 98e15-98e1e 527->531 532 98e4a-98e54 528->532 533 98e2e-98e45 call 8f2c6 call 8f2d9 call 927ec 528->533 530->531 530->533 536 98ebf-98ed9 531->536 534 98e5b-98e79 call 93820 call 929c8 * 2 532->534 535 98e56-98e58 532->535 565 9900c 533->565 569 98e7b-98e91 call 8f2d9 call 8f2c6 534->569 570 98e96-98ebc call 99424 534->570 535->534 538 98fad-98fb6 call 9f89b 536->538 539 98edf-98eef 536->539 552 99029 538->552 553 98fb8-98fca 538->553 539->538 542 98ef5-98ef7 539->542 542->538 546 98efd-98f23 542->546 546->538 550 98f29-98f3c 546->550 550->538 555 98f3e-98f40 550->555 557 9902d-99045 ReadFile 552->557 553->552 558 98fcc-98fdb GetConsoleMode 553->558 555->538 560 98f42-98f6d 555->560 562 990a1-990ac GetLastError 557->562 563 99047-9904d 557->563 558->552 564 98fdd-98fe1 558->564 560->538 568 98f6f-98f82 560->568 571 990ae-990c0 call 8f2d9 call 8f2c6 562->571 572 990c5-990c8 562->572 563->562 573 9904f 563->573 564->557 566 98fe3-98ffd ReadConsoleW 564->566 567 9900f-99019 call 929c8 565->567 574 98fff GetLastError 566->574 575 9901e-99027 566->575 567->521 568->538 579 98f84-98f86 568->579 569->565 570->536 571->565 576 990ce-990d0 572->576 577 99005-9900b call 8f2a3 572->577 583 99052-99064 573->583 574->577 575->583 576->567 577->565 579->538 586 98f88-98fa8 579->586 583->567 590 99066-9906a 583->590 586->538 591 9906c-9907c call 98a61 590->591 592 99083-9908e 590->592 604 9907f-99081 591->604 598 9909a-9909f call 988a1 592->598 599 99090 call 98bb1 592->599 605 99095-99098 598->605 599->605 604->567 605->604
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d33aaebb4cccd3b9f1e34185cff1252f56ad2ea69816f129d42e3e244a19cd11
                                          • Instruction ID: fffd72a36da3ef3754a8c7603a0989029613889a4479d15fba5cce04ba16a5f2
                                          • Opcode Fuzzy Hash: d33aaebb4cccd3b9f1e34185cff1252f56ad2ea69816f129d42e3e244a19cd11
                                          • Instruction Fuzzy Hash: 99C1D074904249AFDF21EFACC855BEDBBF4BF4A310F044099E468A7392D7309941EB61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 607 14f2770-14f281e call 14f0000 610 14f2825-14f284b call 14f3680 CreateFileW 607->610 613 14f284d 610->613 614 14f2852-14f2862 610->614 615 14f299d-14f29a1 613->615 619 14f2869-14f2883 VirtualAlloc 614->619 620 14f2864 614->620 617 14f29e3-14f29e6 615->617 618 14f29a3-14f29a7 615->618 621 14f29e9-14f29f0 617->621 622 14f29a9-14f29ac 618->622 623 14f29b3-14f29b7 618->623 626 14f288a-14f28a1 ReadFile 619->626 627 14f2885 619->627 620->615 628 14f2a45-14f2a5a 621->628 629 14f29f2-14f29fd 621->629 622->623 624 14f29b9-14f29c3 623->624 625 14f29c7-14f29cb 623->625 624->625 632 14f29cd-14f29d7 625->632 633 14f29db 625->633 634 14f28a8-14f28e8 VirtualAlloc 626->634 635 14f28a3 626->635 627->615 630 14f2a5c-14f2a67 VirtualFree 628->630 631 14f2a6a-14f2a72 628->631 636 14f29ff 629->636 637 14f2a01-14f2a0d 629->637 630->631 632->633 633->617 638 14f28ef-14f290a call 14f38d0 634->638 639 14f28ea 634->639 635->615 636->628 640 14f2a0f-14f2a1f 637->640 641 14f2a21-14f2a2d 637->641 647 14f2915-14f291f 638->647 639->615 643 14f2a43 640->643 644 14f2a2f-14f2a38 641->644 645 14f2a3a-14f2a40 641->645 643->621 644->643 645->643 648 14f2952-14f2966 call 14f36e0 647->648 649 14f2921-14f2950 call 14f38d0 647->649 655 14f296a-14f296e 648->655 656 14f2968 648->656 649->647 657 14f297a-14f297e 655->657 658 14f2970-14f2974 FindCloseChangeNotification 655->658 656->615 659 14f298e-14f2997 657->659 660 14f2980-14f298b VirtualFree 657->660 658->657 659->610 659->615 660->659
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 014F2841
                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 014F2A67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateFileFreeVirtual
                                          • String ID:
                                          • API String ID: 204039940-0
                                          • Opcode ID: 56d4a07515a69c217c6e9093a4c978e985ec34eac0ef6790ae7a8c87854d9146
                                          • Instruction ID: 40a6f2aa64d7d731a2cd60b95d5ddf5cbf0a23e8627ac25e29471434654b244b
                                          • Opcode Fuzzy Hash: 56d4a07515a69c217c6e9093a4c978e985ec34eac0ef6790ae7a8c87854d9146
                                          • Instruction Fuzzy Hash: 2DA1F670E00209EBDB14CFA4C994FEEBBB5BF48304F20855EE605AB391D7B59A45CB64

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 671 62c63-62cd3 CreateWindowExW * 2 ShowWindow * 2
                                          APIs
                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00062C91
                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00062CB2
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00061CAD,?), ref: 00062CC6
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00061CAD,?), ref: 00062CCF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$CreateShow
                                          • String ID: AutoIt v3$edit
                                          • API String ID: 1584632944-3779509399
                                          • Opcode ID: 64dcad21201eb9fde687a6105487188297ed0332c15d80f07968198b4336ebde
                                          • Instruction ID: c3093791d62daa382d200a98c3cf2b510e2ea513e52713be12125324284c5e0a
                                          • Opcode Fuzzy Hash: 64dcad21201eb9fde687a6105487188297ed0332c15d80f07968198b4336ebde
                                          • Instruction Fuzzy Hash: B1F0DA755443987AFB311717AC0DEB77EBDE7C6F60B00005AFA00A79A0C6651894EEB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$H$Variable must be of type 'Object'.
                                          • API String ID: 0-1412995245
                                          • Opcode ID: 9f4a6ebed1b2f77e305edc5f6593e22df2d3bd3cbae6da843639a413ffaa0256
                                          • Instruction ID: f9baf74adc9726ebcbafc5bb9c7d987e6ee19b3c5d8c29a50b6e926a8e3a0bb6
                                          • Opcode Fuzzy Hash: 9f4a6ebed1b2f77e305edc5f6593e22df2d3bd3cbae6da843639a413ffaa0256
                                          • Instruction Fuzzy Hash: 3DC28B79A00355CFCB24DF58C884AADB7F2BF09310F248569E906AB392D775EE41CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1296 14f24e0-14f25ea call 14f0000 call 14f2390 1301 14f25ff 1296->1301 1302 14f25ec-14f25f4 1296->1302 1304 14f2607-14f266e call 14f2300 CreateFileW 1301->1304 1302->1301 1305 14f25f6-14f25fd call 14f2360 1302->1305 1312 14f2675-14f2685 1304->1312 1313 14f2670 1304->1313 1305->1301 1305->1304 1316 14f268c-14f26a6 VirtualAlloc 1312->1316 1317 14f2687 1312->1317 1314 14f2725-14f272a 1313->1314 1318 14f26aa-14f26c1 ReadFile 1316->1318 1319 14f26a8 1316->1319 1317->1314 1320 14f26c5-14f26ff call 14f2410 call 14f1300 1318->1320 1321 14f26c3 1318->1321 1319->1314 1326 14f271b-14f2723 ExitProcess 1320->1326 1327 14f2701-14f2716 call 14f2460 1320->1327 1321->1314 1326->1314 1327->1326
                                          APIs
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 014F2664
                                          • VirtualAlloc.KERNELBASE(00000000,000000FF,00003000,00000004), ref: 014F2699
                                          • ReadFile.KERNELBASE(000000FF,00000000,000000FF,?,00000000), ref: 014F26BC
                                          • ExitProcess.KERNEL32(00000000), ref: 014F271D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: File$AllocCreateExitProcessReadVirtual
                                          • String ID: W9XALCFEPGGXYY8O23VDA7
                                          • API String ID: 1333605300-1334338727
                                          • Opcode ID: caf40082cf5f2754b39d0d479040dbf2b45ceb0effa6aaf49fd6903d82ef9d71
                                          • Instruction ID: 9899e2aa38bcfff07037c822823e404d00651f8c20650712396f23ea34ff527d
                                          • Opcode Fuzzy Hash: caf40082cf5f2754b39d0d479040dbf2b45ceb0effa6aaf49fd6903d82ef9d71
                                          • Instruction Fuzzy Hash: 6B617F70D04249DBEB11DBB4C858BEEBBB9AF19304F04419DE608BB3C1D7BA5A44CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1329 d2947-d29b9 call a1f50 call d25d6 call 7fe0b call 65722 call d274e call 6511f call 85232 1344 d2a6c-d2a73 call d2e66 1329->1344 1345 d29bf-d29c6 call d2e66 1329->1345 1350 d2a7c 1344->1350 1351 d2a75-d2a77 1344->1351 1345->1351 1352 d29cc-d2a6a call 8d583 call 84983 call 89038 call 8d583 call 89038 * 2 1345->1352 1355 d2a7f-d2b3a call 650f5 * 8 call d3017 call 8e5eb 1350->1355 1353 d2cb6-d2cb7 1351->1353 1352->1355 1358 d2cd5-d2cdb 1353->1358 1394 d2b3c-d2b3e 1355->1394 1395 d2b43-d2b5e call d2792 1355->1395 1359 d2cdd-d2ced call 7fdcd call 7fe14 1358->1359 1360 d2cf0-d2cf6 1358->1360 1359->1360 1394->1353 1398 d2b64-d2b6c 1395->1398 1399 d2bf0-d2bfc call 8e678 1395->1399 1400 d2b6e-d2b72 1398->1400 1401 d2b74 1398->1401 1406 d2bfe-d2c0d DeleteFileW 1399->1406 1407 d2c12-d2c16 1399->1407 1403 d2b79-d2b97 call 650f5 1400->1403 1401->1403 1411 d2b99-d2b9e 1403->1411 1412 d2bc1-d2bd7 call d211d call 8dbb3 1403->1412 1406->1353 1409 d2c18-d2c7e call d25d6 call 8d2eb * 2 call d22ce 1407->1409 1410 d2c91-d2ca5 CopyFileW 1407->1410 1414 d2cb9-d2ccf DeleteFileW call d2fd8 1409->1414 1434 d2c80-d2c8f DeleteFileW 1409->1434 1410->1414 1415 d2ca7-d2cb4 DeleteFileW 1410->1415 1416 d2ba1-d2bb4 call d28d2 1411->1416 1429 d2bdc-d2be7 1412->1429 1420 d2cd4 1414->1420 1415->1353 1427 d2bb6-d2bbf 1416->1427 1420->1358 1427->1412 1429->1398 1431 d2bed 1429->1431 1431->1399 1434->1353
                                          APIs
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 000D2C05
                                          • DeleteFileW.KERNEL32(?), ref: 000D2C87
                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 000D2C9D
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 000D2CAE
                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 000D2CC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: File$Delete$Copy
                                          • String ID:
                                          • API String ID: 3226157194-0
                                          • Opcode ID: 95c42e0a75e32d0d1472074e7ca7ccda5d534d2d08441d08b0094bc538120c7b
                                          • Instruction ID: a4d1aba422adb25d5d8367737e81e128272ea1936ae635c3082745d578b4674b
                                          • Opcode Fuzzy Hash: 95c42e0a75e32d0d1472074e7ca7ccda5d534d2d08441d08b0094bc538120c7b
                                          • Instruction Fuzzy Hash: 4CB12C71D00219ABDF21EBA4CC85EEEB7BDEF59350F1040A6F509E6252EB349A448F61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1471 63b1c-63b27 1472 63b99-63b9b 1471->1472 1473 63b29-63b2e 1471->1473 1475 63b8c-63b8f 1472->1475 1473->1472 1474 63b30-63b48 RegOpenKeyExW 1473->1474 1474->1472 1476 63b4a-63b69 RegQueryValueExW 1474->1476 1477 63b80-63b8b RegCloseKey 1476->1477 1478 63b6b-63b76 1476->1478 1477->1475 1479 63b90-63b97 1478->1479 1480 63b78-63b7a 1478->1480 1481 63b7e 1479->1481 1480->1481 1481->1477
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00063B0F,SwapMouseButtons,00000004,?), ref: 00063B40
                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00063B0F,SwapMouseButtons,00000004,?), ref: 00063B61
                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00063B0F,SwapMouseButtons,00000004,?), ref: 00063B83
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID: Control Panel\Mouse
                                          • API String ID: 3677997916-824357125
                                          • Opcode ID: b05fabd71d859aa951cb680d13713b3e391c7c7b7cb155e6812a97e49393a52f
                                          • Instruction ID: facf77da32edc9b9249a70a978f6cfbb62547afb99ea5f8960fb44b22de5098f
                                          • Opcode Fuzzy Hash: b05fabd71d859aa951cb680d13713b3e391c7c7b7cb155e6812a97e49393a52f
                                          • Instruction Fuzzy Hash: 66115AB1510208FFEB208FA4DC45EEEB7BDEF01740B105459AA01D7110D7319E40A7A0
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 014F1B2D
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014F1B51
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014F1B73
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: e733957529af6e45a9970993b3126d24b4c627d0c98d0703371c929c9dc0e71a
                                          • Instruction ID: c1fe968707112636cad1471e52527d1291f96f55b5e6fa946e9d209d4b8f28b0
                                          • Opcode Fuzzy Hash: e733957529af6e45a9970993b3126d24b4c627d0c98d0703371c929c9dc0e71a
                                          • Instruction Fuzzy Hash: 9662EA30A14258DBEB24CFA4C850BDEB776EF58700F1091A9D20DEB3A4E7759E81CB59
                                          APIs
                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 000A33A2
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00063A04
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: IconLoadNotifyShell_String_wcslen
                                          • String ID: Line:
                                          • API String ID: 2289894680-1585850449
                                          • Opcode ID: b9ccbfccb49b4b6c8d31b52c37253195ce72dd5429e4933d7e1399b6ca3871a5
                                          • Instruction ID: 39c5b8685173fc9f0df08ce3524bd6a2153c26af8d28062d0b84cb616675679a
                                          • Opcode Fuzzy Hash: b9ccbfccb49b4b6c8d31b52c37253195ce72dd5429e4933d7e1399b6ca3871a5
                                          • Instruction Fuzzy Hash: 4331C171408314AAD721EB20DC46BEFB7D9AB41720F04492EF59A935D2DB709B48CBD2
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00080668
                                            • Part of subcall function 000832A4: RaiseException.KERNEL32(?,?,?,0008068A,?,00131444,?,?,?,?,?,?,0008068A,00061129,00128738,00061129), ref: 00083304
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00080685
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID: Unknown exception
                                          • API String ID: 3476068407-410509341
                                          • Opcode ID: a3d794a527b2f14a4f51b08f424f794caecab64aff030142b0ad4ee85cc7c2b7
                                          • Instruction ID: 6b71e6c7eb67c3451b7fd6ef7c359c1c2f40f075ee3f7f1bdd182cb9fc0c5319
                                          • Opcode Fuzzy Hash: a3d794a527b2f14a4f51b08f424f794caecab64aff030142b0ad4ee85cc7c2b7
                                          • Instruction Fuzzy Hash: 86F0C23490020EB7CB50B664E846CEE7BAD7F40710B608531B9A8965D2EF71EA29C794
                                          APIs
                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 000D302F
                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 000D3044
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Temp$FileNamePath
                                          • String ID: aut
                                          • API String ID: 3285503233-3010740371
                                          • Opcode ID: 50f56ceee93c81fb4dfb8308073d9bf8d853e7cd645a21f7b431b31fbe82c571
                                          • Instruction ID: 3a1421bae82cd2b63e75b90ea1f79ab6b30817f37541cc53b7b522f1a4d5f1c6
                                          • Opcode Fuzzy Hash: 50f56ceee93c81fb4dfb8308073d9bf8d853e7cd645a21f7b431b31fbe82c571
                                          • Instruction Fuzzy Hash: 8AD05E72500328A7EA60E7A4AD0EFDB3A6CDB04750F0002A1B655E20D2DAB49984CAD0
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 000E82F5
                                          • TerminateProcess.KERNEL32(00000000), ref: 000E82FC
                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 000E84DD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$CurrentFreeLibraryTerminate
                                          • String ID:
                                          • API String ID: 146820519-0
                                          • Opcode ID: 7124ec0abaf358e41959657162d9b0b9bdd5e8a62ea9e30626b979b29acad9de
                                          • Instruction ID: 580df235167cb9589f1e69017a87448906c1a3e61577c738fdb509f0a21a892c
                                          • Opcode Fuzzy Hash: 7124ec0abaf358e41959657162d9b0b9bdd5e8a62ea9e30626b979b29acad9de
                                          • Instruction Fuzzy Hash: 9D127A71A083419FD724DF28C484B6ABBE5FF88314F04895DE8899B392DB31E945CF92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5b81ab1bfe54fbded514bf2d498db6a40bf65152640d55496a00f968052a1c2b
                                          • Instruction ID: c263a12af8bfb4a917051ddc8aed913079f585aa74f5a25da840385092cae846
                                          • Opcode Fuzzy Hash: 5b81ab1bfe54fbded514bf2d498db6a40bf65152640d55496a00f968052a1c2b
                                          • Instruction Fuzzy Hash: A651A2B1D0060AAFDF22AFA6CC45EFEBBF8AF05312F140059F405A7292D7319941EB61
                                          APIs
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00061BF4
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00061BFC
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00061C07
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00061C12
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00061C1A
                                            • Part of subcall function 00061BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00061C22
                                            • Part of subcall function 00061B4A: RegisterWindowMessageW.USER32(00000004,?,000612C4), ref: 00061BA2
                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0006136A
                                          • OleInitialize.OLE32 ref: 00061388
                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 000A24AB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                          • String ID:
                                          • API String ID: 1986988660-0
                                          • Opcode ID: 356e755f865c01312cbbcfc3eb3d495090f6d8d07d73202bf934b0db6005dac3
                                          • Instruction ID: 203759ccfbbd13da43f9adf183a004184a734934d665c1dd9edac0de74d07f60
                                          • Opcode Fuzzy Hash: 356e755f865c01312cbbcfc3eb3d495090f6d8d07d73202bf934b0db6005dac3
                                          • Instruction Fuzzy Hash: 4571EDB5905304AFD384EF79EE46AA53AE1FB8A340718862ED10AD7B62EB704481CF54
                                          APIs
                                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0006556D
                                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0006557D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FilePointer
                                          • String ID:
                                          • API String ID: 973152223-0
                                          • Opcode ID: f774260e1c77e0561ce404ea983297dacc4d6e4a0576265ba27207a5459212fa
                                          • Instruction ID: 507b01b03b5573bd8fe4bbf63a183654814302763ae6630c48d5b61c1d09c450
                                          • Opcode Fuzzy Hash: f774260e1c77e0561ce404ea983297dacc4d6e4a0576265ba27207a5459212fa
                                          • Instruction Fuzzy Hash: 1A313A71A00A09EFDB14CF68CC85B9DB7B6FB48315F14862AE91A97240D771FE94CB90
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,000985CC,?,00128CC8,0000000C), ref: 00098704
                                          • GetLastError.KERNEL32(?,000985CC,?,00128CC8,0000000C), ref: 0009870E
                                          • __dosmaperr.LIBCMT ref: 00098739
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                          • String ID:
                                          • API String ID: 490808831-0
                                          • Opcode ID: ac9406c61b962bff76ac9560c55ab5645426ad65b5a7be09ccec0606a1d26898
                                          • Instruction ID: 4a80f3c467ffa39655b5c3d4291d042eb861f2d533b86f23b0626d00dcb6de20
                                          • Opcode Fuzzy Hash: ac9406c61b962bff76ac9560c55ab5645426ad65b5a7be09ccec0606a1d26898
                                          • Instruction Fuzzy Hash: 3C016B3360422027DEA16234AC45BBE67C94B83775F398119F9489F2D3DEA0CD81F390
                                          APIs
                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,000D2CD4,?,?,?,00000004,00000001), ref: 000D2FF2
                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,000D2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 000D3006
                                          • CloseHandle.KERNEL32(00000000,?,000D2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 000D300D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateHandleTime
                                          • String ID:
                                          • API String ID: 3397143404-0
                                          • Opcode ID: ad0a7fa437579432909e73a4de139fbd233bd4a0dc705d50271632309f411127
                                          • Instruction ID: 9fc1648511e5bb3f97e36b27661d78142f010c8fa36c04e4388c4707e5fa810d
                                          • Opcode Fuzzy Hash: ad0a7fa437579432909e73a4de139fbd233bd4a0dc705d50271632309f411127
                                          • Instruction Fuzzy Hash: 23E0863228031477F2301755BD0EF9B3E5CE786B71F114214F719B51D046A41611E2A8
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 000717F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: CALL
                                          • API String ID: 1385522511-4196123274
                                          • Opcode ID: 59f18857edd408bd2330f1ba749dd64e0b74bcae712f65169cffdcdb36516d89
                                          • Instruction ID: 559440a2d9929b49c1a85086f1ea81353d5bd752b2d3b0075b19ab2fc9c1a0ec
                                          • Opcode Fuzzy Hash: 59f18857edd408bd2330f1ba749dd64e0b74bcae712f65169cffdcdb36516d89
                                          • Instruction Fuzzy Hash: 5A227C70A08241DFC764DF18C490AAABBF1BF85314F14891DF49A8B3A2D73AE945CB56
                                          APIs
                                          • _wcslen.LIBCMT ref: 000D6F6B
                                            • Part of subcall function 00064ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064EFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LibraryLoad_wcslen
                                          • String ID: >>>AUTOIT SCRIPT<<<
                                          • API String ID: 3312870042-2806939583
                                          • Opcode ID: d340d6b35f9a4081ddcaeeaa5490c930defea7a58f1d77e0873b71ff97840421
                                          • Instruction ID: 509355b7045c475879f9e2ac852e77767b840c35742f0cfb725578c087a917f1
                                          • Opcode Fuzzy Hash: d340d6b35f9a4081ddcaeeaa5490c930defea7a58f1d77e0873b71ff97840421
                                          • Instruction Fuzzy Hash: 72B194311087018FC714EF20C4919AEB7E6AF94314F54496DF49A973A2EF31ED45CBA2
                                          APIs
                                          • GetOpenFileNameW.COMDLG32(?), ref: 000A2C8C
                                            • Part of subcall function 00063AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00063A97,?,?,00062E7F,?,?,?,00000000), ref: 00063AC2
                                            • Part of subcall function 00062DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00062DC4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Name$Path$FileFullLongOpen
                                          • String ID: X
                                          • API String ID: 779396738-3081909835
                                          • Opcode ID: 59e107f04db63f82a8c8ed6f8b880d0451e9a8faa7ae91d545baea45543c542f
                                          • Instruction ID: d2d1961fe7e9d829bc3b9dfca98fd98f6b5784088bc6ddbe3638c2c3461f8256
                                          • Opcode Fuzzy Hash: 59e107f04db63f82a8c8ed6f8b880d0451e9a8faa7ae91d545baea45543c542f
                                          • Instruction Fuzzy Hash: 1E21A571A002989FDB41EF94D845BEE7BF9AF49314F008069E445B7282DBB45A89CFA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID: EA06
                                          • API String ID: 2638373210-3962188686
                                          • Opcode ID: 08475a289011389f542fbf0c625787c7d223095f7490a5d24a2590bd85e044b9
                                          • Instruction ID: c96ebfbd4b5380d2a1e3803a18d91a7f82ca389e758a1cbd40177d935becb0ea
                                          • Opcode Fuzzy Hash: 08475a289011389f542fbf0c625787c7d223095f7490a5d24a2590bd85e044b9
                                          • Instruction Fuzzy Hash: DE01B5729042687EDF68D7A8C856EEEBBF8DB15301F00459AF192D21C2E5B4E6088B70
                                          APIs
                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00063908
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_
                                          • String ID:
                                          • API String ID: 1144537725-0
                                          • Opcode ID: a31d642f4edf280de886e5e04d8b830eab51420b42b5608236598ea80504f771
                                          • Instruction ID: a850b440bbe9a3619ccdf3ea13f50fc56265be07183dada6453968e0ce844a9e
                                          • Opcode Fuzzy Hash: a31d642f4edf280de886e5e04d8b830eab51420b42b5608236598ea80504f771
                                          • Instruction Fuzzy Hash: 1131A2715047019FE760DF64D885BDBBBE8FB49718F00092EF59A83641EB71AA44CB92
                                          APIs
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0006949C,?,00008000), ref: 00065773
                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0006949C,?,00008000), ref: 000A4052
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: 4421cedd3224b5804243edd96b32f90ca1d537bc732510067365c37661085157
                                          • Instruction ID: 9ea46fcd5132b5e0e47c9fe4f9a3646d49b10bc2327f287b83ec215d867e8887
                                          • Opcode Fuzzy Hash: 4421cedd3224b5804243edd96b32f90ca1d537bc732510067365c37661085157
                                          • Instruction Fuzzy Hash: 2E01B530145725B6E3700A6ADC0EF977F99EF067B1F108300BA9D6E1E0CBB45854DB90
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0006BB4E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID:
                                          • API String ID: 1385522511-0
                                          • Opcode ID: b59dcf0b9ac8d62ac7bc35e66a561287d34b2b057980b362a1a362bfb61307c7
                                          • Instruction ID: 987e8a07f705246393c8431151a6fbd7786b716c2e1b586f7cffe88a2aca9c05
                                          • Opcode Fuzzy Hash: b59dcf0b9ac8d62ac7bc35e66a561287d34b2b057980b362a1a362bfb61307c7
                                          • Instruction Fuzzy Hash: A7328CB4A042099FDB24DF58C894AFEB7FAFF44314F148059E905AB262D774EE81CB91
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 014F1B2D
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014F1B51
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014F1B73
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: f062d9386360323abe608eb8aa61f53b926788e5bce96864e9f45577f6f52855
                                          • Instruction ID: 64f5842a3766c994098223ae5c88d5e3f61994e4b44b600f2f4dfef17eade513
                                          • Opcode Fuzzy Hash: f062d9386360323abe608eb8aa61f53b926788e5bce96864e9f45577f6f52855
                                          • Instruction Fuzzy Hash: E312DD24E24658C6EB24DF64D8507DEB232EF68300F1091ED910DEB7A5E77A4E81CF5A
                                          APIs
                                            • Part of subcall function 00064E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00064EDD,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E9C
                                            • Part of subcall function 00064E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00064EAE
                                            • Part of subcall function 00064E90: FreeLibrary.KERNEL32(00000000,?,?,00064EDD,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064EC0
                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064EFD
                                            • Part of subcall function 00064E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,000A3CDE,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E62
                                            • Part of subcall function 00064E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00064E74
                                            • Part of subcall function 00064E59: FreeLibrary.KERNEL32(00000000,?,?,000A3CDE,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E87
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Library$Load$AddressFreeProc
                                          • String ID:
                                          • API String ID: 2632591731-0
                                          • Opcode ID: c8e46108c020f06a31b29267c31d166a6a302fff70223f1e26c4ab0ba073abbc
                                          • Instruction ID: 7e2c7104d10f636b6c809cf786075810377e912ab366331dfb342de72cbcc50e
                                          • Opcode Fuzzy Hash: c8e46108c020f06a31b29267c31d166a6a302fff70223f1e26c4ab0ba073abbc
                                          • Instruction Fuzzy Hash: EA110632600305EADF25FF60DD03FED77A6AF40711F20842EF542AA1C2EE719A059790
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: __wsopen_s
                                          • String ID:
                                          • API String ID: 3347428461-0
                                          • Opcode ID: 4e505ee72b159acc426d3fc9a282f99128fb7e1a8fa113a6c2a2693e0b3fe4b6
                                          • Instruction ID: c3fdd3d615a688de8de4faa8f2975942c11c845e8a106ffd7a3eb728ecbd1728
                                          • Opcode Fuzzy Hash: 4e505ee72b159acc426d3fc9a282f99128fb7e1a8fa113a6c2a2693e0b3fe4b6
                                          • Instruction Fuzzy Hash: 7611487590410AAFCF05DF58E9409DE7BF8EF49300F108069F808AB312DA30DA11DBA4
                                          APIs
                                          • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0006543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00069A9C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileRead
                                          • String ID:
                                          • API String ID: 2738559852-0
                                          • Opcode ID: 88e90410ae8144a733870a3f33c33d649c043a19e0443aa5118030a515925de6
                                          • Instruction ID: 42425818e8af0af54d795cca25f409b1d35200c271f2aa3ccbcd44fd091b0ada
                                          • Opcode Fuzzy Hash: 88e90410ae8144a733870a3f33c33d649c043a19e0443aa5118030a515925de6
                                          • Instruction Fuzzy Hash: 9B1148352047059FEB20CF85C881B66B7FAEF44764F14C42EE99B8AA51C770B945CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                          • Instruction ID: 1b949e47a1256934ef6f2eb2c2759f40730878ede1dc5ead727e968d24012cfc
                                          • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                          • Instruction Fuzzy Hash: ADF02832511E14A6DB313A79DC05BDA3398BF623B4F140715F4E4932E3EB70D81297A5
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6,?,00061129), ref: 00093852
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: e5f8ae9597de2272327417079a52e5b8446e6a3894b9d5e422a5341baef2f607
                                          • Instruction ID: b06ba5b5405872a4a0b7977363198cd00206147f123d79eec0666c5f7c8e171e
                                          • Opcode Fuzzy Hash: e5f8ae9597de2272327417079a52e5b8446e6a3894b9d5e422a5341baef2f607
                                          • Instruction Fuzzy Hash: 07E0ED3110032AA6EE313A779C05BEB36C9BF42BB0F050021BC8592892CF20DE01BAE0
                                          APIs
                                          • _free.LIBCMT ref: 00094D9C
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorFreeHeapLast_free
                                          • String ID:
                                          • API String ID: 1353095263-0
                                          • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                          • Instruction ID: 17b10ea2a2f4b0e56e417bcfe2cd5e756d945dd59309ab8375c570617f56e436
                                          • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                          • Instruction Fuzzy Hash: 8CE092361013059F8B60CF6CD400AC2B7F4EF843207218529E89DD3311D331E812CB80
                                          APIs
                                          • FreeLibrary.KERNEL32(?,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064F6D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID:
                                          • API String ID: 3664257935-0
                                          • Opcode ID: c0de64c9454d74ab5cc963a3796040727a9670506bb94ca951ee1e443fce54f5
                                          • Instruction ID: b73462fc188383d305c63ebfce52c4080db66d5e765874ffea533c346e336824
                                          • Opcode Fuzzy Hash: c0de64c9454d74ab5cc963a3796040727a9670506bb94ca951ee1e443fce54f5
                                          • Instruction Fuzzy Hash: C4F03071105751CFDB789F64D490826B7E6BF14319310897EE1DA82511C7319854DF10
                                          APIs
                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00062DC4
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LongNamePath_wcslen
                                          • String ID:
                                          • API String ID: 541455249-0
                                          • Opcode ID: e509b3a4515f5216612b65e11097ba3dd7fb572ad1a1280d90f7587f153ffb6b
                                          • Instruction ID: a8803c46e7fe62a0bb01417db7a932782e9e7c6b0e17723f5f1c56f71e72e9f3
                                          • Opcode Fuzzy Hash: e509b3a4515f5216612b65e11097ba3dd7fb572ad1a1280d90f7587f153ffb6b
                                          • Instruction Fuzzy Hash: 69E0CD766001245BD71096989C06FEA77DDDFC8790F044071FD09D7249DA64AD80C550
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID:
                                          • API String ID: 2638373210-0
                                          • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                          • Instruction ID: fa5af4fffeffd5ecac0ec39a0d57215a46f2463b662e192b1dfbb35b0c0ed1e6
                                          • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                          • Instruction Fuzzy Hash: 32E04FB0609B009FDF796A28A8517F677E89F49300F10086EF6DF92352E57268458A5D
                                          APIs
                                            • Part of subcall function 00063837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00063908
                                            • Part of subcall function 0006D730: GetInputState.USER32 ref: 0006D807
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00062B6B
                                            • Part of subcall function 000630F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0006314E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                          • String ID:
                                          • API String ID: 3667716007-0
                                          • Opcode ID: fb5af9261db772071e2f98182a357c9c44ed7f9686770b7a3ec92c0d53f38ca2
                                          • Instruction ID: ccedb85e711ee1ace04ac89a79bec06a42ab98051284080785677515937225a9
                                          • Opcode Fuzzy Hash: fb5af9261db772071e2f98182a357c9c44ed7f9686770b7a3ec92c0d53f38ca2
                                          • Instruction Fuzzy Hash: 39E0CD2170424417D608BB75A9525FDF75BDBD1351F40153EF542531A3DF2486498392
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,00000000,?,000A0704,?,?,00000000,?,000A0704,00000000,0000000C), ref: 000A03B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: db8aea35c084bd4fbe067827b866f576b951183b09f6d03bff2e6210aa37ebea
                                          • Instruction ID: 41149611b5a462ec4d09a4f7c1b7ea0394c293ec2afd034d004ff8e0f0d9fdad
                                          • Opcode Fuzzy Hash: db8aea35c084bd4fbe067827b866f576b951183b09f6d03bff2e6210aa37ebea
                                          • Instruction Fuzzy Hash: CFD06C3204010DBBEF028F84DD06EDA3BAAFB48714F014000BE1856020C736E831EB90
                                          APIs
                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00061CBC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: InfoParametersSystem
                                          • String ID:
                                          • API String ID: 3098949447-0
                                          • Opcode ID: 2004d03bda4d9131a6e20b64999c718ad4c087389b9c210d0e5032a9a4f78d05
                                          • Instruction ID: 318e2ea09bc83740f5bb52c8b4975e162261ad084d134a6916cac357dcdeb45a
                                          • Opcode Fuzzy Hash: 2004d03bda4d9131a6e20b64999c718ad4c087389b9c210d0e5032a9a4f78d05
                                          • Instruction Fuzzy Hash: 0BC09236380308EFF2149B80BD4BF607764B348F11F048001F609AADE3C3B228A4EA50
                                          APIs
                                            • Part of subcall function 00065745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0006949C,?,00008000), ref: 00065773
                                          • GetLastError.KERNEL32(00000002,00000000), ref: 000D76DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateErrorFileLast
                                          • String ID:
                                          • API String ID: 1214770103-0
                                          • Opcode ID: 132673ba226ac0311a2a7bf8ea83ee5c018cdcb8e2ed0454b1761909f49c45f5
                                          • Instruction ID: bf651b1252520757f688eefc2499b7d3f0b5f55cdee1e72dc625b0516e49705a
                                          • Opcode Fuzzy Hash: 132673ba226ac0311a2a7bf8ea83ee5c018cdcb8e2ed0454b1761909f49c45f5
                                          • Instruction Fuzzy Hash: 418191306087019FC714EF28C491BADB7E2AF89314F44451EF88A5B392EB74ED45CBA2
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction ID: 511185563a55c086bd75eb9a13b7ab93e8dc250e306aa0c445c5659710e7e512
                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction Fuzzy Hash: 8A3112B4A0010ADBC769CF59D580979FBA2FF49300B24C2A5E809CB652D735EDC1CBC4
                                          APIs
                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 014F2A67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FreeVirtual
                                          • String ID:
                                          • API String ID: 1263568516-0
                                          • Opcode ID: a2f09042e8b8218b62577ab9939fd8ad4f1ab35591ca5a7ca790d0063d9bd37b
                                          • Instruction ID: eee05ad61abb2ba71a4c0f567d420fa0acee353b30a6302e57b2d8d7c5101c7e
                                          • Opcode Fuzzy Hash: a2f09042e8b8218b62577ab9939fd8ad4f1ab35591ca5a7ca790d0063d9bd37b
                                          • Instruction Fuzzy Hash: F5010035E40208EFEB64CBA4C954FDEBBB1AF44701F20819AE601A7391C7759E44DF50
                                          APIs
                                          • Sleep.KERNELBASE(000007D0), ref: 014F2312
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142893759.00000000014F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14f0000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                          • Instruction ID: 00dc13a5fc6df48e7d4efb0351dc6e0573165e2f45941431bbebd423ff07167d
                                          • Opcode Fuzzy Hash: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                          • Instruction Fuzzy Hash: 19F0B67594010EABCF00EFA4C9499EEBB74FF04311F504559EA1AA2280DB70AA518B61
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 000F961A
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 000F965B
                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 000F969F
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 000F96C9
                                          • SendMessageW.USER32 ref: 000F96F2
                                          • GetKeyState.USER32(00000011), ref: 000F978B
                                          • GetKeyState.USER32(00000009), ref: 000F9798
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 000F97AE
                                          • GetKeyState.USER32(00000010), ref: 000F97B8
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 000F97E9
                                          • SendMessageW.USER32 ref: 000F9810
                                          • SendMessageW.USER32(?,00001030,?,000F7E95), ref: 000F9918
                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 000F992E
                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 000F9941
                                          • SetCapture.USER32(?), ref: 000F994A
                                          • ClientToScreen.USER32(?,?), ref: 000F99AF
                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 000F99BC
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 000F99D6
                                          • ReleaseCapture.USER32 ref: 000F99E1
                                          • GetCursorPos.USER32(?), ref: 000F9A19
                                          • ScreenToClient.USER32(?,?), ref: 000F9A26
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 000F9A80
                                          • SendMessageW.USER32 ref: 000F9AAE
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 000F9AEB
                                          • SendMessageW.USER32 ref: 000F9B1A
                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 000F9B3B
                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 000F9B4A
                                          • GetCursorPos.USER32(?), ref: 000F9B68
                                          • ScreenToClient.USER32(?,?), ref: 000F9B75
                                          • GetParent.USER32(?), ref: 000F9B93
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 000F9BFA
                                          • SendMessageW.USER32 ref: 000F9C2B
                                          • ClientToScreen.USER32(?,?), ref: 000F9C84
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 000F9CB4
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 000F9CDE
                                          • SendMessageW.USER32 ref: 000F9D01
                                          • ClientToScreen.USER32(?,?), ref: 000F9D4E
                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 000F9D82
                                            • Part of subcall function 00079944: GetWindowLongW.USER32(?,000000EB), ref: 00079952
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F9E05
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                          • String ID: @GUI_DRAGID$F
                                          • API String ID: 3429851547-4164748364
                                          • Opcode ID: ba70f2a6a3a69507cbcba5e84a69af82ebe2d17d54c8406509d14d65dab85022
                                          • Instruction ID: d38a0c9a65d1bdb40c61afc30472a818877fb91709e0942e2e99e68ed88117bc
                                          • Opcode Fuzzy Hash: ba70f2a6a3a69507cbcba5e84a69af82ebe2d17d54c8406509d14d65dab85022
                                          • Instruction Fuzzy Hash: DD427A34208208AFE724DF28CD44FBABBE5FF49714F140619F699C7AA1D731A894EB51
                                          APIs
                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 000F48F3
                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 000F4908
                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 000F4927
                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 000F494B
                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 000F495C
                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 000F497B
                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 000F49AE
                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 000F49D4
                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 000F4A0F
                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 000F4A56
                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 000F4A7E
                                          • IsMenu.USER32(?), ref: 000F4A97
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 000F4AF2
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 000F4B20
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F4B94
                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 000F4BE3
                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 000F4C82
                                          • wsprintfW.USER32 ref: 000F4CAE
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 000F4CC9
                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 000F4CF1
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 000F4D13
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 000F4D33
                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 000F4D5A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                          • String ID: %d/%02d/%02d
                                          • API String ID: 4054740463-328681919
                                          • Opcode ID: e0b869c0cc10af4129e60d9d2bb099abe441857b23a2bd3fe9fbc2e00b50ef31
                                          • Instruction ID: ef74fbad20ca12ff20a39aa433fca20e189288e4181368f37a77a2102ea4a79d
                                          • Opcode Fuzzy Hash: e0b869c0cc10af4129e60d9d2bb099abe441857b23a2bd3fe9fbc2e00b50ef31
                                          • Instruction Fuzzy Hash: 1C12C071600258ABFB248F28CC49FBF7BF8AF45710F104129FA19DA6A1DB789945EB50
                                          APIs
                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0007F998
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 000BF474
                                          • IsIconic.USER32(00000000), ref: 000BF47D
                                          • ShowWindow.USER32(00000000,00000009), ref: 000BF48A
                                          • SetForegroundWindow.USER32(00000000), ref: 000BF494
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 000BF4AA
                                          • GetCurrentThreadId.KERNEL32 ref: 000BF4B1
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 000BF4BD
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 000BF4CE
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 000BF4D6
                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 000BF4DE
                                          • SetForegroundWindow.USER32(00000000), ref: 000BF4E1
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 000BF4F6
                                          • keybd_event.USER32(00000012,00000000), ref: 000BF501
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 000BF50B
                                          • keybd_event.USER32(00000012,00000000), ref: 000BF510
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 000BF519
                                          • keybd_event.USER32(00000012,00000000), ref: 000BF51E
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 000BF528
                                          • keybd_event.USER32(00000012,00000000), ref: 000BF52D
                                          • SetForegroundWindow.USER32(00000000), ref: 000BF530
                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 000BF557
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 4125248594-2988720461
                                          • Opcode ID: 340f25de7cf9897a02492f2871ce0cf3218b23575583505e2850ec2f47d620c7
                                          • Instruction ID: 9ee355b21ce7ed8cffc86381280c1335b99eebc16788e15f94889c19dfc4467c
                                          • Opcode Fuzzy Hash: 340f25de7cf9897a02492f2871ce0cf3218b23575583505e2850ec2f47d620c7
                                          • Instruction Fuzzy Hash: 53313D71A4021DBAFB306BB55D4AFBF7EACEB44B50F100065FA01E61D1C7B55D50EAA0
                                          APIs
                                            • Part of subcall function 000C16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 000C170D
                                            • Part of subcall function 000C16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 000C173A
                                            • Part of subcall function 000C16C3: GetLastError.KERNEL32 ref: 000C174A
                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 000C1286
                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 000C12A8
                                          • CloseHandle.KERNEL32(?), ref: 000C12B9
                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 000C12D1
                                          • GetProcessWindowStation.USER32 ref: 000C12EA
                                          • SetProcessWindowStation.USER32(00000000), ref: 000C12F4
                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 000C1310
                                            • Part of subcall function 000C10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,000C11FC), ref: 000C10D4
                                            • Part of subcall function 000C10BF: CloseHandle.KERNEL32(?,?,000C11FC), ref: 000C10E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                          • String ID: $default$winsta0
                                          • API String ID: 22674027-1027155976
                                          • Opcode ID: 2c1ef905f5684ff950ee3a351f6f49d1a3e1c644c05b48b75cfa0e6681a7af4b
                                          • Instruction ID: 89b11667d1b2fa65a61795a9a043c0643597b8acdfcc6395d86bf94e1dbdbde1
                                          • Opcode Fuzzy Hash: 2c1ef905f5684ff950ee3a351f6f49d1a3e1c644c05b48b75cfa0e6681a7af4b
                                          • Instruction Fuzzy Hash: ED81CC71900209AFEF259FA4DD4AFEE7BB9EF06700F14416DFA10E61A2D7348A54DB60
                                          APIs
                                            • Part of subcall function 000C10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 000C1114
                                            • Part of subcall function 000C10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1120
                                            • Part of subcall function 000C10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C112F
                                            • Part of subcall function 000C10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1136
                                            • Part of subcall function 000C10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 000C114D
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 000C0BCC
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 000C0C00
                                          • GetLengthSid.ADVAPI32(?), ref: 000C0C17
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 000C0C51
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 000C0C6D
                                          • GetLengthSid.ADVAPI32(?), ref: 000C0C84
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 000C0C8C
                                          • HeapAlloc.KERNEL32(00000000), ref: 000C0C93
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 000C0CB4
                                          • CopySid.ADVAPI32(00000000), ref: 000C0CBB
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 000C0CEA
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 000C0D0C
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 000C0D1E
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0D45
                                          • HeapFree.KERNEL32(00000000), ref: 000C0D4C
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0D55
                                          • HeapFree.KERNEL32(00000000), ref: 000C0D5C
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0D65
                                          • HeapFree.KERNEL32(00000000), ref: 000C0D6C
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 000C0D78
                                          • HeapFree.KERNEL32(00000000), ref: 000C0D7F
                                            • Part of subcall function 000C1193: GetProcessHeap.KERNEL32(00000008,000C0BB1,?,00000000,?,000C0BB1,?), ref: 000C11A1
                                            • Part of subcall function 000C1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,000C0BB1,?), ref: 000C11A8
                                            • Part of subcall function 000C1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,000C0BB1,?), ref: 000C11B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: 673c4ec6f8e7e4f2d032dd4f56ef4739613175efacd4bf017867e330144c0d4a
                                          • Instruction ID: 99cba2df4b57c87cd6dd0e2230a124d3ad24e2ddd71c597fd84b7e6d74fc3ba5
                                          • Opcode Fuzzy Hash: 673c4ec6f8e7e4f2d032dd4f56ef4739613175efacd4bf017867e330144c0d4a
                                          • Instruction Fuzzy Hash: EC716BB290020AEBEF10DFE4DD45FEEBBB8BF05700F044619E915A61A1DB75AA05CB60
                                          APIs
                                          • OpenClipboard.USER32(000FCC08), ref: 000DEB29
                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 000DEB37
                                          • GetClipboardData.USER32(0000000D), ref: 000DEB43
                                          • CloseClipboard.USER32 ref: 000DEB4F
                                          • GlobalLock.KERNEL32(00000000), ref: 000DEB87
                                          • CloseClipboard.USER32 ref: 000DEB91
                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 000DEBBC
                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 000DEBC9
                                          • GetClipboardData.USER32(00000001), ref: 000DEBD1
                                          • GlobalLock.KERNEL32(00000000), ref: 000DEBE2
                                          • GlobalUnlock.KERNEL32(00000000,?), ref: 000DEC22
                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 000DEC38
                                          • GetClipboardData.USER32(0000000F), ref: 000DEC44
                                          • GlobalLock.KERNEL32(00000000), ref: 000DEC55
                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 000DEC77
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 000DEC94
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 000DECD2
                                          • GlobalUnlock.KERNEL32(00000000,?,?), ref: 000DECF3
                                          • CountClipboardFormats.USER32 ref: 000DED14
                                          • CloseClipboard.USER32 ref: 000DED59
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                          • String ID:
                                          • API String ID: 420908878-0
                                          • Opcode ID: 21f4ec9a84719784238e78812f27ec2c7d100d0f8020ac97800a9d1bb2de7ee6
                                          • Instruction ID: 8dee16d1150cd2d1e4c11625e1d40333b6618658bb2ff12efd82f3ceeeddb601
                                          • Opcode Fuzzy Hash: 21f4ec9a84719784238e78812f27ec2c7d100d0f8020ac97800a9d1bb2de7ee6
                                          • Instruction Fuzzy Hash: 5B61BB34204346AFE310EF20C985F7A77E9AF84714F14451AF4469B7A2CB35E90ADBB2
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000D69BE
                                          • FindClose.KERNEL32(00000000), ref: 000D6A12
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 000D6A4E
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 000D6A75
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 000D6AB2
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 000D6ADF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                          • API String ID: 3830820486-3289030164
                                          • Opcode ID: 4cf2ff653543b6c95535f2210211d89cf6a9325e3ad36a639ce918e324c23e13
                                          • Instruction ID: 539d0a041c449ac8d9bda9a0bcaf52053f84a8586e3c6ccae19bc52b95554fc7
                                          • Opcode Fuzzy Hash: 4cf2ff653543b6c95535f2210211d89cf6a9325e3ad36a639ce918e324c23e13
                                          • Instruction Fuzzy Hash: 91D16271508340AFD310DBA4C982EBBB7EDAF88704F44491EF589C7292EB75DA44CB62
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 000D9663
                                          • GetFileAttributesW.KERNEL32(?), ref: 000D96A1
                                          • SetFileAttributesW.KERNEL32(?,?), ref: 000D96BB
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 000D96D3
                                          • FindClose.KERNEL32(00000000), ref: 000D96DE
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 000D96FA
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D974A
                                          • SetCurrentDirectoryW.KERNEL32(00126B7C), ref: 000D9768
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 000D9772
                                          • FindClose.KERNEL32(00000000), ref: 000D977F
                                          • FindClose.KERNEL32(00000000), ref: 000D978F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                          • String ID: *.*
                                          • API String ID: 1409584000-438819550
                                          • Opcode ID: d531a5883e50283951751d6124379b7b97f090b544ad3dfd7b026e44480964db
                                          • Instruction ID: 4cd30cd136b59770ebce24b4ba3522f9f0c5a9c022d6b21ceb1e2dfc009be65a
                                          • Opcode Fuzzy Hash: d531a5883e50283951751d6124379b7b97f090b544ad3dfd7b026e44480964db
                                          • Instruction Fuzzy Hash: 5531D03264431D6AEF54EFB4ED09EEE37ECAF09321F144156E904E22A0DB38DA44CB20
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 000D97BE
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 000D9819
                                          • FindClose.KERNEL32(00000000), ref: 000D9824
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 000D9840
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D9890
                                          • SetCurrentDirectoryW.KERNEL32(00126B7C), ref: 000D98AE
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 000D98B8
                                          • FindClose.KERNEL32(00000000), ref: 000D98C5
                                          • FindClose.KERNEL32(00000000), ref: 000D98D5
                                            • Part of subcall function 000CDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 000CDB00
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                          • String ID: *.*
                                          • API String ID: 2640511053-438819550
                                          • Opcode ID: 41bd78e9c49234e9bd703bf749ce31b09be315a8f48c3cbce9dfabb91a513bdb
                                          • Instruction ID: ac792e752ebf0ca934bd0f847e6560a1bcfab7d5500b2039ba941fd388f96144
                                          • Opcode Fuzzy Hash: 41bd78e9c49234e9bd703bf749ce31b09be315a8f48c3cbce9dfabb91a513bdb
                                          • Instruction Fuzzy Hash: 5B31D23254031D6AEF14EFA4EC49EEE77ACAF06721F144156E850A22E1DF34DA44EB70
                                          APIs
                                            • Part of subcall function 000EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000EB6AE,?,?), ref: 000EC9B5
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000EC9F1
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA68
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000EBF3E
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 000EBFA9
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EBFCD
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 000EC02C
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 000EC0E7
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 000EC154
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 000EC1E9
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 000EC23A
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 000EC2E3
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 000EC382
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EC38F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                          • String ID:
                                          • API String ID: 3102970594-0
                                          • Opcode ID: 62f04753f41235cb7e644ac44491d128f2dd9196ce00ea7440637acceb4eb111
                                          • Instruction ID: 370e105da0ccc8f71510ff68171c63c4ffbadd8b80dadcd20989d79af8b35781
                                          • Opcode Fuzzy Hash: 62f04753f41235cb7e644ac44491d128f2dd9196ce00ea7440637acceb4eb111
                                          • Instruction Fuzzy Hash: F40280716042409FD714CF29C895E6ABBE5EF89308F18C49DF84ADB2A2DB31ED46CB51
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 000D8257
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 000D8267
                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 000D8273
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 000D8310
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D8324
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D8356
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 000D838C
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D8395
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryTime$File$Local$System
                                          • String ID: *.*
                                          • API String ID: 1464919966-438819550
                                          • Opcode ID: 40165f448e50cf6c847f6bfc450c46327205a6970be519006f39fe107c7d12f6
                                          • Instruction ID: ab4c40caf1ddd633a8dc3b0b18d23c99661469f58c52d8a551403b642814f9e4
                                          • Opcode Fuzzy Hash: 40165f448e50cf6c847f6bfc450c46327205a6970be519006f39fe107c7d12f6
                                          • Instruction Fuzzy Hash: B3616C725043459FD710EF60C845DAEB3E9FF89310F04892EF98987252EB35E945CBA2
                                          APIs
                                            • Part of subcall function 00063AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00063A97,?,?,00062E7F,?,?,?,00000000), ref: 00063AC2
                                            • Part of subcall function 000CE199: GetFileAttributesW.KERNEL32(?,000CCF95), ref: 000CE19A
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000CD122
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 000CD1DD
                                          • MoveFileW.KERNEL32(?,?), ref: 000CD1F0
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 000CD20D
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 000CD237
                                            • Part of subcall function 000CD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,000CD21C,?,?), ref: 000CD2B2
                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 000CD253
                                          • FindClose.KERNEL32(00000000), ref: 000CD264
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 1946585618-1173974218
                                          • Opcode ID: b16376f046aca2a0a0324629834053af444c291dedff94702adea2495c20bbb5
                                          • Instruction ID: 82dce3869e9da4197bb77667a94906c82dd17ca4062e988e35938d5195e6b1ca
                                          • Opcode Fuzzy Hash: b16376f046aca2a0a0324629834053af444c291dedff94702adea2495c20bbb5
                                          • Instruction Fuzzy Hash: 96614D3180110DAFDF15EBE0DA52EEDB7BAAF65300F64416AE40177192EB319F09DB61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                          • String ID:
                                          • API String ID: 1737998785-0
                                          • Opcode ID: 317e5ad39c814e1a4bcc92136797f77842fa1df6ab5bd3e64b778a01980154bd
                                          • Instruction ID: 984f44f56aa1a5985bc2a534235f0423ed5098b6bb28aa52390430bc2361ffd4
                                          • Opcode Fuzzy Hash: 317e5ad39c814e1a4bcc92136797f77842fa1df6ab5bd3e64b778a01980154bd
                                          • Instruction Fuzzy Hash: 03417C35204651AFE720EF15D889F69BBE5EF44328F14809AE45A8FB62C775EC41CBA0
                                          APIs
                                            • Part of subcall function 000C16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 000C170D
                                            • Part of subcall function 000C16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 000C173A
                                            • Part of subcall function 000C16C3: GetLastError.KERNEL32 ref: 000C174A
                                          • ExitWindowsEx.USER32(?,00000000), ref: 000CE932
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                          • String ID: $ $@$SeShutdownPrivilege
                                          • API String ID: 2234035333-3163812486
                                          • Opcode ID: 9c9116b46554bb843b6461d4c3a143e4be68285d14af18767141384c6b829c94
                                          • Instruction ID: dc663f1290ad2aa9510d50fb84a62b2bdfea06833dc60f6cfa8aa354e68e7c78
                                          • Opcode Fuzzy Hash: 9c9116b46554bb843b6461d4c3a143e4be68285d14af18767141384c6b829c94
                                          • Instruction Fuzzy Hash: B301D672610215ABFBA427B4DC86FFF729CE715750F154529F902E21D2DAB45C809294
                                          APIs
                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 000E1276
                                          • WSAGetLastError.WSOCK32 ref: 000E1283
                                          • bind.WSOCK32(00000000,?,00000010), ref: 000E12BA
                                          • WSAGetLastError.WSOCK32 ref: 000E12C5
                                          • closesocket.WSOCK32(00000000), ref: 000E12F4
                                          • listen.WSOCK32(00000000,00000005), ref: 000E1303
                                          • WSAGetLastError.WSOCK32 ref: 000E130D
                                          • closesocket.WSOCK32(00000000), ref: 000E133C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                          • String ID:
                                          • API String ID: 540024437-0
                                          • Opcode ID: 397b7726241c24737325c37a6fa3da767b212d9c18eabc96c9cc5c27e4f063e8
                                          • Instruction ID: e3a723002625293c2daaeb27a932969abcf18137e99c8e498c9b57e195dcdda6
                                          • Opcode Fuzzy Hash: 397b7726241c24737325c37a6fa3da767b212d9c18eabc96c9cc5c27e4f063e8
                                          • Instruction Fuzzy Hash: 1441B1306001409FE710DF25C989BA9BBE6AF46318F18808CD9569F2A2C771ED82CBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$InitializeCriticalSectionEx
                                          • API String ID: 4168288129-2709433496
                                          • Opcode ID: 16d7d01367fc4a2f52f1244774e61aa175d758f7d3ce0d28262ade52ae14471a
                                          • Instruction ID: 2986584407253bc8c9137bb5bb920c869429f8de2c2f63f220ed60daa6c79a1e
                                          • Opcode Fuzzy Hash: 16d7d01367fc4a2f52f1244774e61aa175d758f7d3ce0d28262ade52ae14471a
                                          • Instruction Fuzzy Hash: E9C23771E086298BDF65CE28DD407EAB7F5EB88305F1441EAD84DE7241E778AE819F40
                                          APIs
                                          • _free.LIBCMT ref: 0009B9D4
                                          • _free.LIBCMT ref: 0009B9F8
                                          • _free.LIBCMT ref: 0009BB7F
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00103700), ref: 0009BB91
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0013121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0009BC09
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00131270,000000FF,?,0000003F,00000000,?), ref: 0009BC36
                                          • _free.LIBCMT ref: 0009BD4B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: a5140ae1ae9c8cbf075dfeaf5a58252d0aae202cbb58f487c3aa270571ce72a1
                                          • Instruction ID: ea323843b196b7f2844e387ef5a2b56ce03ce2c0a240622f4c1b36bb996607dd
                                          • Opcode Fuzzy Hash: a5140ae1ae9c8cbf075dfeaf5a58252d0aae202cbb58f487c3aa270571ce72a1
                                          • Instruction Fuzzy Hash: 1AC11871904209AFDF20DF68AE51BEE7BE9EF41330F24415AE494D7292EB709E41E750
                                          APIs
                                            • Part of subcall function 00063AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00063A97,?,?,00062E7F,?,?,?,00000000), ref: 00063AC2
                                            • Part of subcall function 000CE199: GetFileAttributesW.KERNEL32(?,000CCF95), ref: 000CE19A
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000CD420
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 000CD470
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 000CD481
                                          • FindClose.KERNEL32(00000000), ref: 000CD498
                                          • FindClose.KERNEL32(00000000), ref: 000CD4A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 2649000838-1173974218
                                          • Opcode ID: e03bab36ec86eb389272f412c86c8b52610d6a1ddd97ab8212d7e0804245bb38
                                          • Instruction ID: a81c27d024a06f23b58acd3110508e794df1a4fae87fbc10f778306a0c854bb1
                                          • Opcode Fuzzy Hash: e03bab36ec86eb389272f412c86c8b52610d6a1ddd97ab8212d7e0804245bb38
                                          • Instruction Fuzzy Hash: EB316D310083459FD204EF64D992DEFB7E9AF92314F444A2EF5D593192EB30AA09DB63
                                          APIs
                                          • _wcslen.LIBCMT ref: 000D64DC
                                          • CoInitialize.OLE32(00000000), ref: 000D6639
                                          • CoCreateInstance.OLE32(000FFCF8,00000000,00000001,000FFB68,?), ref: 000D6650
                                          • CoUninitialize.OLE32 ref: 000D68D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: 3c5a9b33a3b0d53803a235a8a155fff08c534245c594234a5aa0eaf7148ddeb4
                                          • Instruction ID: 0b58ef0853a3ec2f490006a0e575fdb8a297629e7fcde381142124acf53c35ac
                                          • Opcode Fuzzy Hash: 3c5a9b33a3b0d53803a235a8a155fff08c534245c594234a5aa0eaf7148ddeb4
                                          • Instruction Fuzzy Hash: 22D14A71508301AFD314EF24C881EABB7E9FF94704F10496DF5958B292DB72E945CBA2
                                          APIs
                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 000E22E8
                                            • Part of subcall function 000DE4EC: GetWindowRect.USER32(?,?), ref: 000DE504
                                          • GetDesktopWindow.USER32 ref: 000E2312
                                          • GetWindowRect.USER32(00000000), ref: 000E2319
                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 000E2355
                                          • GetCursorPos.USER32(?), ref: 000E2381
                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 000E23DF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                          • String ID:
                                          • API String ID: 2387181109-0
                                          • Opcode ID: ad0961d3f34b5713daf31856e4561034ee2139533460d1851a696075293ee074
                                          • Instruction ID: 455dbcb345bfb56f3bf63ee202068376b15fee4e743e9f72ac274f1fa1f7e840
                                          • Opcode Fuzzy Hash: ad0961d3f34b5713daf31856e4561034ee2139533460d1851a696075293ee074
                                          • Instruction Fuzzy Hash: 0B319072504355AFE720DF65C845FABB7EAFB84714F000A19F585A7191DA34EA08CB92
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 000D9B78
                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 000D9C8B
                                            • Part of subcall function 000D3874: GetInputState.USER32 ref: 000D38CB
                                            • Part of subcall function 000D3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000D3966
                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 000D9BA8
                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 000D9C75
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                          • String ID: *.*
                                          • API String ID: 1972594611-438819550
                                          • Opcode ID: be2d274ebec4f140db655a4ead4e792ac91aae6d17c637a5e021313ebbac20c7
                                          • Instruction ID: 885f057a618bfb4e4fe57ee8581fe7a139dfc1b565f093aea77ff538643d8f5f
                                          • Opcode Fuzzy Hash: be2d274ebec4f140db655a4ead4e792ac91aae6d17c637a5e021313ebbac20c7
                                          • Instruction Fuzzy Hash: 47414F7194420AAFDF55DFA4C986AEEBBF9EF05310F244156E805A32A1EB309E44DF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ERCP$InitializeCriticalSectionEx$VUUU$VUUU$VUUU$VUUU
                                          • API String ID: 0-1173862840
                                          • Opcode ID: dcd8a0eb6d0d43ab74cb2a70fa40d0425cd9bf102215818377d3ec7aeb799e1d
                                          • Instruction ID: cf7df658f090f75b13ba696962110d55a1f25132d5f179c5b91eb7f797b19107
                                          • Opcode Fuzzy Hash: dcd8a0eb6d0d43ab74cb2a70fa40d0425cd9bf102215818377d3ec7aeb799e1d
                                          • Instruction Fuzzy Hash: E9A26171E0061ACBDF74CF98C8447AEB7B2BF55310F2482A9E855A7285EB719D81CF50
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00079A4E
                                          • GetSysColor.USER32(0000000F), ref: 00079B23
                                          • SetBkColor.GDI32(?,00000000), ref: 00079B36
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Color$LongProcWindow
                                          • String ID:
                                          • API String ID: 3131106179-0
                                          • Opcode ID: 9caaf4e777bbd3b5b8ce4430d31a9242b1fbb45e7a0936b28cf38014bae1b005
                                          • Instruction ID: 191e9b81f70052c5d4d2431726cb99c4c06d176ef15e3e9b360118a7fa4767c1
                                          • Opcode Fuzzy Hash: 9caaf4e777bbd3b5b8ce4430d31a9242b1fbb45e7a0936b28cf38014bae1b005
                                          • Instruction Fuzzy Hash: FAA12B70A09444BEE7789A3C8C49EFF36DDDB82300F158109F50AD6E96CA299D41D3BB
                                          APIs
                                            • Part of subcall function 000E304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 000E307A
                                            • Part of subcall function 000E304E: _wcslen.LIBCMT ref: 000E309B
                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 000E185D
                                          • WSAGetLastError.WSOCK32 ref: 000E1884
                                          • bind.WSOCK32(00000000,?,00000010), ref: 000E18DB
                                          • WSAGetLastError.WSOCK32 ref: 000E18E6
                                          • closesocket.WSOCK32(00000000), ref: 000E1915
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 1601658205-0
                                          • Opcode ID: 59813e497c0ad983522a893126d38f5b19def7201e049a12c2b10909f8660482
                                          • Instruction ID: 213a71e7d58db44aa0c9aae58abc7057be08d6e5c41b7fabf9b7d6a82b534185
                                          • Opcode Fuzzy Hash: 59813e497c0ad983522a893126d38f5b19def7201e049a12c2b10909f8660482
                                          • Instruction Fuzzy Hash: E651C871A002109FE710AF24C986FBA77E59F44718F488198F95AAF3D3CB75AD41CB91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                          • String ID:
                                          • API String ID: 292994002-0
                                          • Opcode ID: cedf78897d6cc0591bb2acecf1f89c895247e1346f2d19d5d441fdbb19fbf4fc
                                          • Instruction ID: d3b31f4764c08602803eeefee6f30489702852a455543d135f5815e07eedc183
                                          • Opcode Fuzzy Hash: cedf78897d6cc0591bb2acecf1f89c895247e1346f2d19d5d441fdbb19fbf4fc
                                          • Instruction Fuzzy Hash: 7C2194317402189FE7208F1AD844FBA7BE5AF95314B198068E949CBB52C775EC42EBD0
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 000EA6AC
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 000EA6BA
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • Process32NextW.KERNEL32(00000000,?), ref: 000EA79C
                                          • CloseHandle.KERNEL32(00000000), ref: 000EA7AB
                                            • Part of subcall function 0007CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,000A3303,?), ref: 0007CE8A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                          • String ID:
                                          • API String ID: 1991900642-0
                                          • Opcode ID: a27ee10d8205934eb5b41579d08b5e78deca6849fb4f3223af74b5b68887af86
                                          • Instruction ID: 4afa78eb29e5863d217058f809ad188370dcfa8cd70ebf82d9578ffe3efe312a
                                          • Opcode Fuzzy Hash: a27ee10d8205934eb5b41579d08b5e78deca6849fb4f3223af74b5b68887af86
                                          • Instruction Fuzzy Hash: A0517F715083009FD310EF24C986EABBBE9FF89754F40491DF589A7292EB30E904CB92
                                          APIs
                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 000CAAAC
                                          • SetKeyboardState.USER32(00000080), ref: 000CAAC8
                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 000CAB36
                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 000CAB88
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: 435df1b7de0acc35fabe5d2d625a8f3b81f8030b408eff74d79d0fe01007bc33
                                          • Instruction ID: c1a5f2d7f5c8e115e8c2f04196adc9809e5aa5bbd1bb3f221e002f7ed717d930
                                          • Opcode Fuzzy Hash: 435df1b7de0acc35fabe5d2d625a8f3b81f8030b408eff74d79d0fe01007bc33
                                          • Instruction Fuzzy Hash: 2231E270B4020CAEFF358B648805FFE7BEAAB46324F04421EF181961E2D7798D81D762
                                          APIs
                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 000DCE89
                                          • GetLastError.KERNEL32(?,00000000), ref: 000DCEEA
                                          • SetEvent.KERNEL32(?,?,00000000), ref: 000DCEFE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorEventFileInternetLastRead
                                          • String ID:
                                          • API String ID: 234945975-0
                                          • Opcode ID: 75c4ea66fc3cb902c78d5a9e96dc900d7539102acf3d32e34ecf9f36afc958ff
                                          • Instruction ID: c2dd3ceca9166025fd0ccf89bc29d5a34474788f837f7f1b603e0bc452e64089
                                          • Opcode Fuzzy Hash: 75c4ea66fc3cb902c78d5a9e96dc900d7539102acf3d32e34ecf9f36afc958ff
                                          • Instruction Fuzzy Hash: 40218CB15007069BFB709FA5C949FAA77FCEB40354F10442AE54692252E774EE04DB60
                                          APIs
                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 000C82AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: lstrlen
                                          • String ID: ($|
                                          • API String ID: 1659193697-1631851259
                                          • Opcode ID: 5ab000fbae00e9d901c2b267d27b6ff89ff1bb607d33ea309107e35ff72c5255
                                          • Instruction ID: 181afc78e4bfc6222a5eaa5bbc88df52e923f098819cd6b841901af488bcdfb3
                                          • Opcode Fuzzy Hash: 5ab000fbae00e9d901c2b267d27b6ff89ff1bb607d33ea309107e35ff72c5255
                                          • Instruction Fuzzy Hash: 31322474A006059FCB28CF59C481EAAB7F0FF48710B15C56EE59ADB7A1EB70E981CB44
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000D5CC1
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 000D5D17
                                          • FindClose.KERNEL32(?), ref: 000D5D5F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3541575487-0
                                          • Opcode ID: 72e9ddaf5d2810f5d49efaaca598634ed28655cb5f615372f15f05ac60866508
                                          • Instruction ID: 7cea5feb5a7634448883777b79065e5204ff43d0f28b4e293182a304c7337b1b
                                          • Opcode Fuzzy Hash: 72e9ddaf5d2810f5d49efaaca598634ed28655cb5f615372f15f05ac60866508
                                          • Instruction Fuzzy Hash: 3E516B346047019FD724DF28C895E9AB7E5FF49314F14855EE99A8B3A2CB30E944CFA1
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 0009271A
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00092724
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00092731
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: bf2d2557ed2fcd3d47bec9bb611c596ebc1e921d927748d15550fb6647b812b4
                                          • Instruction ID: 96f47c2d2d7a1ef56f16663b0b2e59438169357262879e3030b6c2ec088e15b8
                                          • Opcode Fuzzy Hash: bf2d2557ed2fcd3d47bec9bb611c596ebc1e921d927748d15550fb6647b812b4
                                          • Instruction Fuzzy Hash: A931C47490121CABCB61EF64DD89BDCB7B8BF08310F5041EAE41CA6261E7349F858F45
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 000D51DA
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 000D5238
                                          • SetErrorMode.KERNEL32(00000000), ref: 000D52A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID:
                                          • API String ID: 1682464887-0
                                          • Opcode ID: 08b77644ea7269eaf4e9eee847253d0f5d1fb496e6cc631f9ae884441ca4a780
                                          • Instruction ID: 2c0c5c19635e3fc66ad5ea605cf1c9638ed4a1d8df34dda8d2f47579cc310f2f
                                          • Opcode Fuzzy Hash: 08b77644ea7269eaf4e9eee847253d0f5d1fb496e6cc631f9ae884441ca4a780
                                          • Instruction Fuzzy Hash: F8314F75A00618DFEB00DF54D884EADBBF5FF49314F048099E8459B352DB35E859CBA0
                                          APIs
                                            • Part of subcall function 0007FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00080668
                                            • Part of subcall function 0007FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00080685
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 000C170D
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 000C173A
                                          • GetLastError.KERNEL32 ref: 000C174A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                          • String ID:
                                          • API String ID: 577356006-0
                                          • Opcode ID: dda1f872ea9df3fea93972da155341ccf880ec4de860fdfa2711df32c472d475
                                          • Instruction ID: 392ff9293fd5f55981b827c900ac0403a6de9e00004dc8d5198faae8cc609d9d
                                          • Opcode Fuzzy Hash: dda1f872ea9df3fea93972da155341ccf880ec4de860fdfa2711df32c472d475
                                          • Instruction Fuzzy Hash: 8511C1B2904309FFE7289F54DC86EBEB7F9EB04714B20852EE05653642EB74BC41CA24
                                          APIs
                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 000CD608
                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 000CD645
                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 000CD650
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseControlCreateDeviceFileHandle
                                          • String ID:
                                          • API String ID: 33631002-0
                                          • Opcode ID: 14b47b39a7964273eced40cb0e61d781e04b67ee5bfb12849fe81e1accbe89ce
                                          • Instruction ID: 4a58703c9d992e7930742f376963d6bb117c3ca7b6abdd80abcd8693ba2f3603
                                          • Opcode Fuzzy Hash: 14b47b39a7964273eced40cb0e61d781e04b67ee5bfb12849fe81e1accbe89ce
                                          • Instruction Fuzzy Hash: FD115E75E05228BFEB208F99DD45FAFBBBCEB45B50F108126F904E7290D6704A05DBA1
                                          APIs
                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 000C168C
                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 000C16A1
                                          • FreeSid.ADVAPI32(?), ref: 000C16B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                          • String ID:
                                          • API String ID: 3429775523-0
                                          • Opcode ID: a1f9368ddfc40c84b23dff9e263fdfa6b2bc6722a9ec45554b579d1818e5ae76
                                          • Instruction ID: 621977cabbe41a6ae6a743e64bfd8e06a3dcb5bac600b66656b4dc3259cc6eb1
                                          • Opcode Fuzzy Hash: a1f9368ddfc40c84b23dff9e263fdfa6b2bc6722a9ec45554b579d1818e5ae76
                                          • Instruction Fuzzy Hash: 76F0F47195030DFBEB00DFE49D8AEAEBBBCEB08604F504965E501E2181E774AA44AA54
                                          APIs
                                          • GetCurrentProcess.KERNEL32(000928E9,?,00084CBE,000928E9,001288B8,0000000C,00084E15,000928E9,00000002,00000000,?,000928E9), ref: 00084D09
                                          • TerminateProcess.KERNEL32(00000000,?,00084CBE,000928E9,001288B8,0000000C,00084E15,000928E9,00000002,00000000,?,000928E9), ref: 00084D10
                                          • ExitProcess.KERNEL32 ref: 00084D22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: bab83bffbee25bd3e92e4caa718f59c00e68a0fb4e11e81d9f1b43f3be8f2263
                                          • Instruction ID: 3084b8cd93d8c8bb1dd5a306335c81b34f98c80223f27841dc33ee027a87a58b
                                          • Opcode Fuzzy Hash: bab83bffbee25bd3e92e4caa718f59c00e68a0fb4e11e81d9f1b43f3be8f2263
                                          • Instruction Fuzzy Hash: D7E0B631000249ABEF12BF54DE0AEA87B69FB41781B118014FC458A523CB39EE52EB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: /
                                          • API String ID: 0-2043925204
                                          • Opcode ID: 10b188fd2f04c6b438188ef4c902a20357b077ba32f756f2d09e57835e4977df
                                          • Instruction ID: e6105664e3256ce732c17fe2fb74b02e49565e877424c77a728e49db53b151b3
                                          • Opcode Fuzzy Hash: 10b188fd2f04c6b438188ef4c902a20357b077ba32f756f2d09e57835e4977df
                                          • Instruction Fuzzy Hash: FC415972900219AFDF209FB9CC49EFB77B8EB84354F508269F905D7181E6709E81DB50
                                          APIs
                                          • GetUserNameW.ADVAPI32(?,?), ref: 000BD28C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: NameUser
                                          • String ID: X64
                                          • API String ID: 2645101109-893830106
                                          • Opcode ID: 46f5805e800b5f5798ae0220ec6e94f143d3be294e85154961aabc655a7a8a3a
                                          • Instruction ID: 247d95a0f2b31d74838529e23838ef7141df8abfd1ce46155a456797dea9d65d
                                          • Opcode Fuzzy Hash: 46f5805e800b5f5798ae0220ec6e94f143d3be294e85154961aabc655a7a8a3a
                                          • Instruction Fuzzy Hash: 0BD0C9B480111DEADBA4CB90DC88DDDB37CBF14305F104156F106A2000DB3495499F10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                          • Instruction ID: 29cde46933aa7bb624500aa062cd77bd7a2238d4d0ff4cc321f469628b447f35
                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                          • Instruction Fuzzy Hash: 12021D71E002199BEF14DFA9C880AADFBF1FF48314F25816AD959E7381D731AA41CB94
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 000D6918
                                          • FindClose.KERNEL32(00000000), ref: 000D6961
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID:
                                          • API String ID: 2295610775-0
                                          • Opcode ID: 85b6f78e63b1ffe3f4c0449e1519d0705a9a5759bfe9c8f475da7004715cc3c8
                                          • Instruction ID: 6952b18bf5f4cb01bd72a5fca13304366ae46aee1c0751aded6122a2c354c561
                                          • Opcode Fuzzy Hash: 85b6f78e63b1ffe3f4c0449e1519d0705a9a5759bfe9c8f475da7004715cc3c8
                                          • Instruction Fuzzy Hash: 8811B1316042009FD710CF69C485E26FBE5EF85328F04C6AAE4698F7A2C731EC05CB90
                                          APIs
                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,000E4891,?,?,00000035,?), ref: 000D37E4
                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,000E4891,?,?,00000035,?), ref: 000D37F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorFormatLastMessage
                                          • String ID:
                                          • API String ID: 3479602957-0
                                          • Opcode ID: f44fa82065c751b92ddc9b946d0bffc2de274b6bcf09be0cb9598997540ef5d4
                                          • Instruction ID: 17b26037f7921bfdc6e0cad277ddca3bbbc7563481d30f83fda1c8ac9b0d3f31
                                          • Opcode Fuzzy Hash: f44fa82065c751b92ddc9b946d0bffc2de274b6bcf09be0cb9598997540ef5d4
                                          • Instruction Fuzzy Hash: 4EF0E5B06053292AF76017A68C4EFEB3AAEEFC5771F000176F509E2281D9609904C6B1
                                          APIs
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 000CB25D
                                          • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 000CB270
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: InputSendkeybd_event
                                          • String ID:
                                          • API String ID: 3536248340-0
                                          • Opcode ID: c1347a2e14c29b37c8fdb018026a14645fc3cafc3dff7228eb83a5a08b717281
                                          • Instruction ID: 51d3a6c3e72e01c07ba612f3fa4497118846e17a20c599713f5d0b0cf21a4cd0
                                          • Opcode Fuzzy Hash: c1347a2e14c29b37c8fdb018026a14645fc3cafc3dff7228eb83a5a08b717281
                                          • Instruction Fuzzy Hash: B7F01D7180424DABEB159FA0C806BBE7BB4FF04305F048409F955A5191C7799615DF94
                                          APIs
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,000C11FC), ref: 000C10D4
                                          • CloseHandle.KERNEL32(?,?,000C11FC), ref: 000C10E9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AdjustCloseHandlePrivilegesToken
                                          • String ID:
                                          • API String ID: 81990902-0
                                          • Opcode ID: c09fcc72cf856569bc8774d33832add3e50675b1056f953c39e9468a4bf7cc1c
                                          • Instruction ID: 593dc31bd57ffdf6db1a3b403dac96c224342a4d7a8cd519154333c38bd3f9c6
                                          • Opcode Fuzzy Hash: c09fcc72cf856569bc8774d33832add3e50675b1056f953c39e9468a4bf7cc1c
                                          • Instruction Fuzzy Hash: BFE04F32008601AEF7252B11FC06EB777E9EF04310B20C82DF4A5804B2DB666C90EB14
                                          Strings
                                          • Variable is not of type 'Object'., xrefs: 000B0C40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Variable is not of type 'Object'.
                                          • API String ID: 0-1840281001
                                          • Opcode ID: b929a50a92bcce546c3e668df3905536ecc29e3dfc2d67f9b2a16aa461ad6c27
                                          • Instruction ID: 3f882226f239e8ff16ed649c53ea3d0aa67c58cbbbcc5a12e8b0293427ee37fa
                                          • Opcode Fuzzy Hash: b929a50a92bcce546c3e668df3905536ecc29e3dfc2d67f9b2a16aa461ad6c27
                                          • Instruction Fuzzy Hash: 89327B70900218DBEF24DF94C895EFEB7F6BF05304F148069E846AB292DB75AE45CB61
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00096766,?,?,00000008,?,?,0009FEFE,00000000), ref: 00096998
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: 1e90d12c447a882d350bbaf2b3ade43a984e3a90c647213ee80a08b0e2a4b081
                                          • Instruction ID: 9a9d07b6e440b7df855eb82a3a18f13cf62b2794ee6324c6e9e0cf184288ef68
                                          • Opcode Fuzzy Hash: 1e90d12c447a882d350bbaf2b3ade43a984e3a90c647213ee80a08b0e2a4b081
                                          • Instruction Fuzzy Hash: F8B14D31610608DFDB55CF28C48AB697BE0FF45364F258658E8DACF2A2C736E991DB40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: 0777d823b97bbe710da9b2eea452c9ec8615bc9d671fea94d33cb119a65719d7
                                          • Instruction ID: 53cd8489faed839cd07c0389ad37100a7365783b5315ed3c78aa7d67fe29939d
                                          • Opcode Fuzzy Hash: 0777d823b97bbe710da9b2eea452c9ec8615bc9d671fea94d33cb119a65719d7
                                          • Instruction Fuzzy Hash: EC124E75D002299BDB64CF58C880BEEB7F5FF48710F1481AAE849EB255DB349E81CB94
                                          APIs
                                          • BlockInput.USER32(00000001), ref: 000DEABD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: BlockInput
                                          • String ID:
                                          • API String ID: 3456056419-0
                                          • Opcode ID: ae2bbd4a868d375b5e759bf15650146b9ab79637f45c5012a18f4325faab0d7f
                                          • Instruction ID: 560da8ee33b9763c731e3c641685ca5a716b34970dadd01c73b5c90a7818eecc
                                          • Opcode Fuzzy Hash: ae2bbd4a868d375b5e759bf15650146b9ab79637f45c5012a18f4325faab0d7f
                                          • Instruction Fuzzy Hash: 7BE01A352002059FD710EF59D805E9AB7E9AF98760F008426FC4ACB361DAB0A8408BA1
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,000803EE), ref: 000809DA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: eb0f5914a9866e346aea32dff7f9475537b0796591344ebbf20d714d33f6c369
                                          • Instruction ID: 820885584be73e34c6f71c34ba06810163f0d6d2bec6a9327cbebc0697d875b0
                                          • Opcode Fuzzy Hash: eb0f5914a9866e346aea32dff7f9475537b0796591344ebbf20d714d33f6c369
                                          • Instruction Fuzzy Hash:
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                          • Instruction ID: 305dfaf2723ad298949231ffe37864b3f3699bae7b704d338be082f9b52eb745
                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                          • Instruction Fuzzy Hash: 0951876168C605DBDBB8B528889D7FE27C9BB52340F380519D8CEC728BDE11DE01D356
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c582be2d4a999d8662b23a53c39b312b7d9d07f9d73e8b0bd819b65980b51ee9
                                          • Instruction ID: 9402268de7ca0780ddd0e3e6b4973dab0d3e8b67ffef5a1324ab3768ee5cc1bd
                                          • Opcode Fuzzy Hash: c582be2d4a999d8662b23a53c39b312b7d9d07f9d73e8b0bd819b65980b51ee9
                                          • Instruction Fuzzy Hash: D0321022D69F014DDB639634C826336A289AFB73C5F15C727E81AB5DAAEB68C4C35100
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca318286f86f82065b77761c74078de282c6765a67eafd54a5583afeb16d4c13
                                          • Instruction ID: 3859228072f3359a5516a06c8353becd8918ec99f967fd313663d43e056e6a44
                                          • Opcode Fuzzy Hash: ca318286f86f82065b77761c74078de282c6765a67eafd54a5583afeb16d4c13
                                          • Instruction Fuzzy Hash: B3321131A041498BFF79CE28C494EFD7BE1EB45304F28816AD89EDB291D638DD81DB15
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a9236796557482abd4f06875c21f19b162f9b17798c80409b357ee429d7c2b6
                                          • Instruction ID: ec06d49e47680fea428538503241e32c484b08e6518d46523af9ef00024c9b30
                                          • Opcode Fuzzy Hash: 8a9236796557482abd4f06875c21f19b162f9b17798c80409b357ee429d7c2b6
                                          • Instruction Fuzzy Hash: 7C22A170A0460ADFDF14CFA4C841AEEB7F6FF45304F244529E816A7291EB369E55CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 24e6b00ef9b85687069981e9ccc634a06ee2090193ec66b3952108b29af53cec
                                          • Instruction ID: 054a4f28060d2985f5074859b563fad4ceeec9de643c0e792b6f2eac6a98f4fe
                                          • Opcode Fuzzy Hash: 24e6b00ef9b85687069981e9ccc634a06ee2090193ec66b3952108b29af53cec
                                          • Instruction Fuzzy Hash: BB02E8B0E0010AEFDB14DF94D881AAEB7F5FF55300F108169E816DB291EB35AE61CB95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d00c14408736b1724a3ccb21657218e844f0f8e774a424725ff0071b2c7f8ba6
                                          • Instruction ID: 316e4bcc2e1583f3181bb749df70f70dc502ede74f9526dd490bde8cc968f894
                                          • Opcode Fuzzy Hash: d00c14408736b1724a3ccb21657218e844f0f8e774a424725ff0071b2c7f8ba6
                                          • Instruction Fuzzy Hash: A961692120870956DAB8B9288895BFE73D6FF91700F74491DE9CEDB28AD711DE42C316
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15726f61a10e7e3db59f0da2d38642a71ce9ec85542465b6499422a5b3df0322
                                          • Instruction ID: f7f9cd2b01816eaac0dcd986fe490867b3bdb18b6b0c744d7f561ee3d0e3312d
                                          • Opcode Fuzzy Hash: 15726f61a10e7e3db59f0da2d38642a71ce9ec85542465b6499422a5b3df0322
                                          • Instruction Fuzzy Hash: 92618C3120CB0992DEB879284851BFF23E8BF56700F704859E8CFDB28AEA12DD428355
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5c57d04380a6f299b0d0c92591149f13f98c7553b7371ed7216d569b6a9f6110
                                          • Instruction ID: 38f5b7d8a2dd187647045011facc20ddeda3ca4b7e84aad01fa691d6c991153a
                                          • Opcode Fuzzy Hash: 5c57d04380a6f299b0d0c92591149f13f98c7553b7371ed7216d569b6a9f6110
                                          • Instruction Fuzzy Hash: 52719F79409690EFDB26CF24D4E1A91BFE1FF1732072948EEC4864B196D275A94ACF02
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 187c48b708d69bf16c9edc36c9298f675d53c76baf12f458ccaf62de94ea82a6
                                          • Instruction ID: 445698f5ce4bb1775b7de4aa40201f9dbcf8530b220633455dc323dac4a5426b
                                          • Opcode Fuzzy Hash: 187c48b708d69bf16c9edc36c9298f675d53c76baf12f458ccaf62de94ea82a6
                                          • Instruction Fuzzy Hash: 0C21E7322206118BD728CF79C82367E77E5AB64320F14862EE4A7C37D1DE35A944CB90
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 000E2B30
                                          • DeleteObject.GDI32(00000000), ref: 000E2B43
                                          • DestroyWindow.USER32 ref: 000E2B52
                                          • GetDesktopWindow.USER32 ref: 000E2B6D
                                          • GetWindowRect.USER32(00000000), ref: 000E2B74
                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 000E2CA3
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 000E2CB1
                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2CF8
                                          • GetClientRect.USER32(00000000,?), ref: 000E2D04
                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 000E2D40
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2D62
                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2D75
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2D80
                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2D89
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2D98
                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2DA1
                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2DA8
                                          • GlobalFree.KERNEL32(00000000), ref: 000E2DB3
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2DC5
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,000FFC38,00000000), ref: 000E2DDB
                                          • GlobalFree.KERNEL32(00000000), ref: 000E2DEB
                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 000E2E11
                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 000E2E30
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E2E52
                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 000E303F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                          • String ID: $AutoIt v3$DISPLAY$static
                                          • API String ID: 2211948467-2373415609
                                          • Opcode ID: 101c91f8870e8657f3bc178f72c512a39f2ddf3c7ab2309dbd8756557cf83458
                                          • Instruction ID: d7628dbb8f86f7cec6f975fa7825f25f05d80437ceafb1fcc17d0d18b4a28b66
                                          • Opcode Fuzzy Hash: 101c91f8870e8657f3bc178f72c512a39f2ddf3c7ab2309dbd8756557cf83458
                                          • Instruction Fuzzy Hash: 1F028C71900209AFEB14DF64CD89EAE7BB9FF49310F108158F915AB2A1DB74AD41CB60
                                          APIs
                                          • SetTextColor.GDI32(?,00000000), ref: 000F712F
                                          • GetSysColorBrush.USER32(0000000F), ref: 000F7160
                                          • GetSysColor.USER32(0000000F), ref: 000F716C
                                          • SetBkColor.GDI32(?,000000FF), ref: 000F7186
                                          • SelectObject.GDI32(?,?), ref: 000F7195
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 000F71C0
                                          • GetSysColor.USER32(00000010), ref: 000F71C8
                                          • CreateSolidBrush.GDI32(00000000), ref: 000F71CF
                                          • FrameRect.USER32(?,?,00000000), ref: 000F71DE
                                          • DeleteObject.GDI32(00000000), ref: 000F71E5
                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 000F7230
                                          • FillRect.USER32(?,?,?), ref: 000F7262
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F7284
                                            • Part of subcall function 000F73E8: GetSysColor.USER32(00000012), ref: 000F7421
                                            • Part of subcall function 000F73E8: SetTextColor.GDI32(?,?), ref: 000F7425
                                            • Part of subcall function 000F73E8: GetSysColorBrush.USER32(0000000F), ref: 000F743B
                                            • Part of subcall function 000F73E8: GetSysColor.USER32(0000000F), ref: 000F7446
                                            • Part of subcall function 000F73E8: GetSysColor.USER32(00000011), ref: 000F7463
                                            • Part of subcall function 000F73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 000F7471
                                            • Part of subcall function 000F73E8: SelectObject.GDI32(?,00000000), ref: 000F7482
                                            • Part of subcall function 000F73E8: SetBkColor.GDI32(?,00000000), ref: 000F748B
                                            • Part of subcall function 000F73E8: SelectObject.GDI32(?,?), ref: 000F7498
                                            • Part of subcall function 000F73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 000F74B7
                                            • Part of subcall function 000F73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 000F74CE
                                            • Part of subcall function 000F73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 000F74DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                          • String ID:
                                          • API String ID: 4124339563-0
                                          • Opcode ID: 36434c86f23035921c20dd3298b062bf16973067456a2b18e9d4ebdc4adc760c
                                          • Instruction ID: 22519edc74d48086d000fa10338f6325f6e3965e6b4ecdafe221f67775d395eb
                                          • Opcode Fuzzy Hash: 36434c86f23035921c20dd3298b062bf16973067456a2b18e9d4ebdc4adc760c
                                          • Instruction Fuzzy Hash: 80A1C172008309BFE7509F64CD49EBB7BE9FB49320F100A18FA66964E1D734E944EB52
                                          APIs
                                          • DestroyWindow.USER32(00000000), ref: 000E273E
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 000E286A
                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 000E28A9
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 000E28B9
                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 000E2900
                                          • GetClientRect.USER32(00000000,?), ref: 000E290C
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 000E2955
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 000E2964
                                          • GetStockObject.GDI32(00000011), ref: 000E2974
                                          • SelectObject.GDI32(00000000,00000000), ref: 000E2978
                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 000E2988
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 000E2991
                                          • DeleteDC.GDI32(00000000), ref: 000E299A
                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 000E29C6
                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 000E29DD
                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 000E2A1D
                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 000E2A31
                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 000E2A42
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 000E2A77
                                          • GetStockObject.GDI32(00000011), ref: 000E2A82
                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 000E2A8D
                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 000E2A97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                          • API String ID: 2910397461-517079104
                                          • Opcode ID: 65e61cb6849c2f75301c069a6164506a85bf62d3dd1e03fac5d855bb8323dc99
                                          • Instruction ID: 20209462d3ceabded246566417186b92deb497a154142e7341d62e0d424bedd1
                                          • Opcode Fuzzy Hash: 65e61cb6849c2f75301c069a6164506a85bf62d3dd1e03fac5d855bb8323dc99
                                          • Instruction Fuzzy Hash: CEB14CB1A00219BFEB14DFA9DD4AFAE7BA9FB08710F004115F915E7691DB74AD40CBA0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 000D4AED
                                          • GetDriveTypeW.KERNEL32(?,000FCB68,?,\\.\,000FCC08), ref: 000D4BCA
                                          • SetErrorMode.KERNEL32(00000000,000FCB68,?,\\.\,000FCC08), ref: 000D4D36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DriveType
                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                          • API String ID: 2907320926-4222207086
                                          • Opcode ID: baa598966388443c64fff41edb959f730c35a92c32a2e3ba559d1818bfccabe4
                                          • Instruction ID: 2f0026448c6ac44b1640b44569a20bea6a04d4c3eab69ceae9db3d40612606ef
                                          • Opcode Fuzzy Hash: baa598966388443c64fff41edb959f730c35a92c32a2e3ba559d1818bfccabe4
                                          • Instruction Fuzzy Hash: 6A61EF30616309DBCB94DF64DA82DBC77B2AF04304B209017F806AB792DB36ED55DB61
                                          APIs
                                          • GetSysColor.USER32(00000012), ref: 000F7421
                                          • SetTextColor.GDI32(?,?), ref: 000F7425
                                          • GetSysColorBrush.USER32(0000000F), ref: 000F743B
                                          • GetSysColor.USER32(0000000F), ref: 000F7446
                                          • CreateSolidBrush.GDI32(?), ref: 000F744B
                                          • GetSysColor.USER32(00000011), ref: 000F7463
                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 000F7471
                                          • SelectObject.GDI32(?,00000000), ref: 000F7482
                                          • SetBkColor.GDI32(?,00000000), ref: 000F748B
                                          • SelectObject.GDI32(?,?), ref: 000F7498
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 000F74B7
                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 000F74CE
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000F74DB
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 000F752A
                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 000F7554
                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 000F7572
                                          • DrawFocusRect.USER32(?,?), ref: 000F757D
                                          • GetSysColor.USER32(00000011), ref: 000F758E
                                          • SetTextColor.GDI32(?,00000000), ref: 000F7596
                                          • DrawTextW.USER32(?,000F70F5,000000FF,?,00000000), ref: 000F75A8
                                          • SelectObject.GDI32(?,?), ref: 000F75BF
                                          • DeleteObject.GDI32(?), ref: 000F75CA
                                          • SelectObject.GDI32(?,?), ref: 000F75D0
                                          • DeleteObject.GDI32(?), ref: 000F75D5
                                          • SetTextColor.GDI32(?,?), ref: 000F75DB
                                          • SetBkColor.GDI32(?,?), ref: 000F75E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                          • String ID:
                                          • API String ID: 1996641542-0
                                          • Opcode ID: ac51f6777488533f861a49c3d8fa7ae8e09b2d3dec364f8d5be6de8a4c6000cf
                                          • Instruction ID: cfc5bdc1b14fb54e51f7cea196144c962becd633dc748c4ae6e5d4f4a6487ec0
                                          • Opcode Fuzzy Hash: ac51f6777488533f861a49c3d8fa7ae8e09b2d3dec364f8d5be6de8a4c6000cf
                                          • Instruction Fuzzy Hash: D3618E7290421CAFEB009FA4DC49EEE7FB9FB09720F104111FA15AB6A1D774A940EB90
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 000F1128
                                          • GetDesktopWindow.USER32 ref: 000F113D
                                          • GetWindowRect.USER32(00000000), ref: 000F1144
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F1199
                                          • DestroyWindow.USER32(?), ref: 000F11B9
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 000F11ED
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 000F120B
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 000F121D
                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 000F1232
                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 000F1245
                                          • IsWindowVisible.USER32(00000000), ref: 000F12A1
                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 000F12BC
                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 000F12D0
                                          • GetWindowRect.USER32(00000000,?), ref: 000F12E8
                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 000F130E
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 000F1328
                                          • CopyRect.USER32(?,?), ref: 000F133F
                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 000F13AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                          • String ID: ($0$tooltips_class32
                                          • API String ID: 698492251-4156429822
                                          • Opcode ID: 964ec4fe5bb170a9dbaed4eaa9f283f73e5da6277a425fc338c397b0f69fa52e
                                          • Instruction ID: 673479bdb99ad518948c8442292b5dd0b3e1e01b2137d91ce90b1dd119cc9dac
                                          • Opcode Fuzzy Hash: 964ec4fe5bb170a9dbaed4eaa9f283f73e5da6277a425fc338c397b0f69fa52e
                                          • Instruction Fuzzy Hash: 9CB1BE71608345EFE740DF64C985BAEBBE5FF84310F008918FA999B6A2C770E844DB91
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 000F02E5
                                          • _wcslen.LIBCMT ref: 000F031F
                                          • _wcslen.LIBCMT ref: 000F0389
                                          • _wcslen.LIBCMT ref: 000F03F1
                                          • _wcslen.LIBCMT ref: 000F0475
                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 000F04C5
                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 000F0504
                                            • Part of subcall function 0007F9F2: _wcslen.LIBCMT ref: 0007F9FD
                                            • Part of subcall function 000C223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 000C2258
                                            • Part of subcall function 000C223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 000C228A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                          • API String ID: 1103490817-719923060
                                          • Opcode ID: 17711198222a6506370710324516bac1bc67d67ee2dbf6e59faec5dae4e6a59b
                                          • Instruction ID: 7e48068109e82e37c87bd5f816efe4f254147b0821cde1903a4d2f9412ac1551
                                          • Opcode Fuzzy Hash: 17711198222a6506370710324516bac1bc67d67ee2dbf6e59faec5dae4e6a59b
                                          • Instruction Fuzzy Hash: 76E1DF312086058FC724DF24C5509BFB3E6BF88714B14896CF99AABAA3DB30ED45DB41
                                          APIs
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00078968
                                          • GetSystemMetrics.USER32(00000007), ref: 00078970
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0007899B
                                          • GetSystemMetrics.USER32(00000008), ref: 000789A3
                                          • GetSystemMetrics.USER32(00000004), ref: 000789C8
                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 000789E5
                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 000789F5
                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00078A28
                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00078A3C
                                          • GetClientRect.USER32(00000000,000000FF), ref: 00078A5A
                                          • GetStockObject.GDI32(00000011), ref: 00078A76
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00078A81
                                            • Part of subcall function 0007912D: GetCursorPos.USER32(?), ref: 00079141
                                            • Part of subcall function 0007912D: ScreenToClient.USER32(00000000,?), ref: 0007915E
                                            • Part of subcall function 0007912D: GetAsyncKeyState.USER32(00000001), ref: 00079183
                                            • Part of subcall function 0007912D: GetAsyncKeyState.USER32(00000002), ref: 0007919D
                                          • SetTimer.USER32(00000000,00000000,00000028,000790FC), ref: 00078AA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                          • String ID: AutoIt v3 GUI
                                          • API String ID: 1458621304-248962490
                                          • Opcode ID: c3b7c40f47090e6293771597e461110ca8a0d7afd8c055225b8795e69222a40e
                                          • Instruction ID: d14e83c08e62703599884cf038dde5ef0c7b773403b37ec260adcdfb4a266524
                                          • Opcode Fuzzy Hash: c3b7c40f47090e6293771597e461110ca8a0d7afd8c055225b8795e69222a40e
                                          • Instruction Fuzzy Hash: E7B16E71A40209AFEB14DF68CD49BEE3BB5FB48314F108229FA15A7290DB38E841CF55
                                          APIs
                                            • Part of subcall function 000C10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 000C1114
                                            • Part of subcall function 000C10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1120
                                            • Part of subcall function 000C10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C112F
                                            • Part of subcall function 000C10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1136
                                            • Part of subcall function 000C10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 000C114D
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 000C0DF5
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 000C0E29
                                          • GetLengthSid.ADVAPI32(?), ref: 000C0E40
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 000C0E7A
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 000C0E96
                                          • GetLengthSid.ADVAPI32(?), ref: 000C0EAD
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 000C0EB5
                                          • HeapAlloc.KERNEL32(00000000), ref: 000C0EBC
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 000C0EDD
                                          • CopySid.ADVAPI32(00000000), ref: 000C0EE4
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 000C0F13
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 000C0F35
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 000C0F47
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0F6E
                                          • HeapFree.KERNEL32(00000000), ref: 000C0F75
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0F7E
                                          • HeapFree.KERNEL32(00000000), ref: 000C0F85
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C0F8E
                                          • HeapFree.KERNEL32(00000000), ref: 000C0F95
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 000C0FA1
                                          • HeapFree.KERNEL32(00000000), ref: 000C0FA8
                                            • Part of subcall function 000C1193: GetProcessHeap.KERNEL32(00000008,000C0BB1,?,00000000,?,000C0BB1,?), ref: 000C11A1
                                            • Part of subcall function 000C1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,000C0BB1,?), ref: 000C11A8
                                            • Part of subcall function 000C1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,000C0BB1,?), ref: 000C11B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: 8fe13c1fc9392e31292a5ab33a1e538cab0e8c2c31361faf739a33fcf3e06fec
                                          • Instruction ID: ec1df0fdc3102c65c7858c2ca3311fdc45f154e196fe6c1c7e39141020caea43
                                          • Opcode Fuzzy Hash: 8fe13c1fc9392e31292a5ab33a1e538cab0e8c2c31361faf739a33fcf3e06fec
                                          • Instruction Fuzzy Hash: D4716D7290020AEBEF20DFA4DD49FEEBBB8BF05300F044129F919E6591D7359A56DB60
                                          APIs
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000EC4BD
                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,000FCC08,00000000,?,00000000,?,?), ref: 000EC544
                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 000EC5A4
                                          • _wcslen.LIBCMT ref: 000EC5F4
                                          • _wcslen.LIBCMT ref: 000EC66F
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 000EC6B2
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 000EC7C1
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 000EC84D
                                          • RegCloseKey.ADVAPI32(?), ref: 000EC881
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EC88E
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 000EC960
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                          • API String ID: 9721498-966354055
                                          • Opcode ID: 825c7eb33b00a7f0e93a0372da7d347ed88e1e5d6bd2f96cf2d787a7aac55c62
                                          • Instruction ID: 285c72c3aaedce2642d1fcb30028d61677138ba3f1c42547965f36b330e27088
                                          • Opcode Fuzzy Hash: 825c7eb33b00a7f0e93a0372da7d347ed88e1e5d6bd2f96cf2d787a7aac55c62
                                          • Instruction Fuzzy Hash: F91267352046419FE714DF15C981E6AB7E5EF88314F14889DF88AAB3A2DB31ED42CB81
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 000F09C6
                                          • _wcslen.LIBCMT ref: 000F0A01
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 000F0A54
                                          • _wcslen.LIBCMT ref: 000F0A8A
                                          • _wcslen.LIBCMT ref: 000F0B06
                                          • _wcslen.LIBCMT ref: 000F0B81
                                            • Part of subcall function 0007F9F2: _wcslen.LIBCMT ref: 0007F9FD
                                            • Part of subcall function 000C2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 000C2BFA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                          • API String ID: 1103490817-4258414348
                                          • Opcode ID: eb127003bb8d780797e6a11bc524d802bb4d5ba05b2d44351ce48fc4f2dcc8ba
                                          • Instruction ID: 1d854d7373cfd91c3df370097b322d549512f45db5f04adc4b280bd5240a5d0f
                                          • Opcode Fuzzy Hash: eb127003bb8d780797e6a11bc524d802bb4d5ba05b2d44351ce48fc4f2dcc8ba
                                          • Instruction Fuzzy Hash: F4E199312087058FC724DF24C45097AB7E2BF98318B54895DF99AABBA3D730ED45DB82
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                          • API String ID: 1256254125-909552448
                                          • Opcode ID: 1e10131bbbf0c2fb635fc9bb7be5dd9005ccac253cd6c47f0a84324815bf1700
                                          • Instruction ID: ab2594c214014c5a960aef2aab58e1d929e5b37887dfe94dccabb184c073e817
                                          • Opcode Fuzzy Hash: 1e10131bbbf0c2fb635fc9bb7be5dd9005ccac253cd6c47f0a84324815bf1700
                                          • Instruction Fuzzy Hash: 4571F7326001AA8FEB20DE7ED941DFF33D5AB60754F290125F866B7285E732CD468391
                                          APIs
                                          • _wcslen.LIBCMT ref: 000F835A
                                          • _wcslen.LIBCMT ref: 000F836E
                                          • _wcslen.LIBCMT ref: 000F8391
                                          • _wcslen.LIBCMT ref: 000F83B4
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 000F83F2
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,000F5BF2), ref: 000F844E
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 000F8487
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 000F84CA
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 000F8501
                                          • FreeLibrary.KERNEL32(?), ref: 000F850D
                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 000F851D
                                          • DestroyIcon.USER32(?,?,?,?,?,000F5BF2), ref: 000F852C
                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 000F8549
                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 000F8555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                          • String ID: .dll$.exe$.icl
                                          • API String ID: 799131459-1154884017
                                          • Opcode ID: a01b4469da88869610042da644b3ec5454a2833984d21ba581d353459ebcc025
                                          • Instruction ID: b00df35e8d22467cb814445270cfd1a51e2596d96e0071ea1c7e5df7285ed4ad
                                          • Opcode Fuzzy Hash: a01b4469da88869610042da644b3ec5454a2833984d21ba581d353459ebcc025
                                          • Instruction Fuzzy Hash: 9061F27150061ABBEB24DF64CC46FFE77A8BF04B10F108609FA15D65D1DB74AA90E7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                          • API String ID: 0-1645009161
                                          • Opcode ID: 96b494dbb71f9924de66b023a721077fa54e0565585d24f9c95811006b25a5ec
                                          • Instruction ID: 8c86347b08d987c1864fbf628c28316896facb2badd8cdd9742344f0c26aecb6
                                          • Opcode Fuzzy Hash: 96b494dbb71f9924de66b023a721077fa54e0565585d24f9c95811006b25a5ec
                                          • Instruction Fuzzy Hash: 5881F571A44609BBDB20AF60DC42FFE37AABF15304F144025FA09AB197EB70DA11D7A5
                                          APIs
                                          • LoadIconW.USER32(00000063), ref: 000C5A2E
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 000C5A40
                                          • SetWindowTextW.USER32(?,?), ref: 000C5A57
                                          • GetDlgItem.USER32(?,000003EA), ref: 000C5A6C
                                          • SetWindowTextW.USER32(00000000,?), ref: 000C5A72
                                          • GetDlgItem.USER32(?,000003E9), ref: 000C5A82
                                          • SetWindowTextW.USER32(00000000,?), ref: 000C5A88
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 000C5AA9
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 000C5AC3
                                          • GetWindowRect.USER32(?,?), ref: 000C5ACC
                                          • _wcslen.LIBCMT ref: 000C5B33
                                          • SetWindowTextW.USER32(?,?), ref: 000C5B6F
                                          • GetDesktopWindow.USER32 ref: 000C5B75
                                          • GetWindowRect.USER32(00000000), ref: 000C5B7C
                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 000C5BD3
                                          • GetClientRect.USER32(?,?), ref: 000C5BE0
                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 000C5C05
                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 000C5C2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                          • String ID:
                                          • API String ID: 895679908-0
                                          • Opcode ID: c81d47ba99ff59526675f19a528d58a3d2d1c977124353c80dbbce883d321905
                                          • Instruction ID: 2d28bcb995bfb254691666952ad613e2e246c228332e15f6a94fa81f0016bf65
                                          • Opcode Fuzzy Hash: c81d47ba99ff59526675f19a528d58a3d2d1c977124353c80dbbce883d321905
                                          • Instruction Fuzzy Hash: F8714A35900B09AFEB20DFA9CE86FAEBBF5FB48705F10451CE142A25A0D775B984DB50
                                          APIs
                                          • LoadCursorW.USER32(00000000,00007F89), ref: 000DFE27
                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 000DFE32
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 000DFE3D
                                          • LoadCursorW.USER32(00000000,00007F03), ref: 000DFE48
                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 000DFE53
                                          • LoadCursorW.USER32(00000000,00007F01), ref: 000DFE5E
                                          • LoadCursorW.USER32(00000000,00007F81), ref: 000DFE69
                                          • LoadCursorW.USER32(00000000,00007F88), ref: 000DFE74
                                          • LoadCursorW.USER32(00000000,00007F80), ref: 000DFE7F
                                          • LoadCursorW.USER32(00000000,00007F86), ref: 000DFE8A
                                          • LoadCursorW.USER32(00000000,00007F83), ref: 000DFE95
                                          • LoadCursorW.USER32(00000000,00007F85), ref: 000DFEA0
                                          • LoadCursorW.USER32(00000000,00007F82), ref: 000DFEAB
                                          • LoadCursorW.USER32(00000000,00007F84), ref: 000DFEB6
                                          • LoadCursorW.USER32(00000000,00007F04), ref: 000DFEC1
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 000DFECC
                                          • GetCursorInfo.USER32(?), ref: 000DFEDC
                                          • GetLastError.KERNEL32 ref: 000DFF1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Cursor$Load$ErrorInfoLast
                                          • String ID:
                                          • API String ID: 3215588206-0
                                          • Opcode ID: ec2c86f87262b80eee3d53d61ac8c8d31e9ae85f86866b9e630b06e770a469b0
                                          • Instruction ID: 052911642649d9028b9141fa204e5ef63a46bba1ff67ea2ea72bbce23b0a9887
                                          • Opcode Fuzzy Hash: ec2c86f87262b80eee3d53d61ac8c8d31e9ae85f86866b9e630b06e770a469b0
                                          • Instruction Fuzzy Hash: 92412570D0431AAADB509FB68C85C6EBFE9FF04754B50853AE11DE7281DB789901CEA1
                                          APIs
                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 000800C6
                                            • Part of subcall function 000800ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0013070C,00000FA0,417DAC6A,?,?,?,?,000A23B3,000000FF), ref: 0008011C
                                            • Part of subcall function 000800ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,000A23B3,000000FF), ref: 00080127
                                            • Part of subcall function 000800ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,000A23B3,000000FF), ref: 00080138
                                            • Part of subcall function 000800ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0008014E
                                            • Part of subcall function 000800ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0008015C
                                            • Part of subcall function 000800ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0008016A
                                            • Part of subcall function 000800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00080195
                                            • Part of subcall function 000800ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 000801A0
                                          • ___scrt_fastfail.LIBCMT ref: 000800E7
                                            • Part of subcall function 000800A3: __onexit.LIBCMT ref: 000800A9
                                          Strings
                                          • WakeAllConditionVariable, xrefs: 00080162
                                          • kernel32.dll, xrefs: 00080133
                                          • InitializeConditionVariable, xrefs: 00080148
                                          • SleepConditionVariableCS, xrefs: 00080154
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00080122
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 66158676-1714406822
                                          • Opcode ID: 666afee78a928513938ba1da29213c5200eb440b56eb5ba40ab8914e9685a135
                                          • Instruction ID: 5cf030e546f76d2305568f0837647127feca41eb3f941213fbd9878b18f4a536
                                          • Opcode Fuzzy Hash: 666afee78a928513938ba1da29213c5200eb440b56eb5ba40ab8914e9685a135
                                          • Instruction Fuzzy Hash: DE212932A4171A6BFB617B64AC0AF7D33D4FF46B60F000135FA8196A92DB789C04DB94
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                          • API String ID: 176396367-1603158881
                                          • Opcode ID: 5737b464f98fc3fd0d4eb3d3adc8fe2843bff176fc94c09efff2b75c1a728099
                                          • Instruction ID: 13739b1d0fa8921cb07245cb7ba8c562b5a2dd69b78c1e2881a6fc7c56202b20
                                          • Opcode Fuzzy Hash: 5737b464f98fc3fd0d4eb3d3adc8fe2843bff176fc94c09efff2b75c1a728099
                                          • Instruction Fuzzy Hash: 4DE1C132A10526ABCB689FA8C481FEEBBB5BF54710F54C11DE456B7241DB30AF858790
                                          APIs
                                          • CharLowerBuffW.USER32(00000000,00000000,000FCC08), ref: 000D4527
                                          • _wcslen.LIBCMT ref: 000D453B
                                          • _wcslen.LIBCMT ref: 000D4599
                                          • _wcslen.LIBCMT ref: 000D45F4
                                          • _wcslen.LIBCMT ref: 000D463F
                                          • _wcslen.LIBCMT ref: 000D46A7
                                            • Part of subcall function 0007F9F2: _wcslen.LIBCMT ref: 0007F9FD
                                          • GetDriveTypeW.KERNEL32(?,00126BF0,00000061), ref: 000D4743
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharDriveLowerType
                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                          • API String ID: 2055661098-1000479233
                                          • Opcode ID: 61d89ddd80a0b656c778f3076108dd7d71e28d5b3d29a51376210efef7c5e920
                                          • Instruction ID: f2c3122a08852b6988992ecd27e8ca6642ce4ba4bdb75af3675368e695f91d0f
                                          • Opcode Fuzzy Hash: 61d89ddd80a0b656c778f3076108dd7d71e28d5b3d29a51376210efef7c5e920
                                          • Instruction Fuzzy Hash: D5B1C0316083029FC720DF28D890AAEB7E5AFA5764F50491EF49AD7396D730D944CBA2
                                          APIs
                                          • _wcslen.LIBCMT ref: 000EB198
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 000EB1B0
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 000EB1D4
                                          • _wcslen.LIBCMT ref: 000EB200
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 000EB214
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 000EB236
                                          • _wcslen.LIBCMT ref: 000EB332
                                            • Part of subcall function 000D05A7: GetStdHandle.KERNEL32(000000F6), ref: 000D05C6
                                          • _wcslen.LIBCMT ref: 000EB34B
                                          • _wcslen.LIBCMT ref: 000EB366
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 000EB3B6
                                          • GetLastError.KERNEL32(00000000), ref: 000EB407
                                          • CloseHandle.KERNEL32(?), ref: 000EB439
                                          • CloseHandle.KERNEL32(00000000), ref: 000EB44A
                                          • CloseHandle.KERNEL32(00000000), ref: 000EB45C
                                          • CloseHandle.KERNEL32(00000000), ref: 000EB46E
                                          • CloseHandle.KERNEL32(?), ref: 000EB4E3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                          • String ID:
                                          • API String ID: 2178637699-0
                                          • Opcode ID: d11ef884e0cdf42057f1448c6802dae1d35f6bd3cc0e1553a302df4a034e5e07
                                          • Instruction ID: fe510c94873d0e5b08e4f2f2d87c6e61935faebec5258eefd362340f90112c43
                                          • Opcode Fuzzy Hash: d11ef884e0cdf42057f1448c6802dae1d35f6bd3cc0e1553a302df4a034e5e07
                                          • Instruction Fuzzy Hash: F0F1BE716083409FD724EF25C891BAFBBE1AF85314F14855DF899AB2A2DB31EC44CB52
                                          APIs
                                          • GetMenuItemCount.USER32(00131990), ref: 000A2F8D
                                          • GetMenuItemCount.USER32(00131990), ref: 000A303D
                                          • GetCursorPos.USER32(?), ref: 000A3081
                                          • SetForegroundWindow.USER32(00000000), ref: 000A308A
                                          • TrackPopupMenuEx.USER32(00131990,00000000,?,00000000,00000000,00000000), ref: 000A309D
                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 000A30A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                          • String ID: 0
                                          • API String ID: 36266755-4108050209
                                          • Opcode ID: 7df604a78376cedb70bbfc999d93982101a978bd2da9d243aad6b5fd79a701e3
                                          • Instruction ID: 586a74c1467212343fa90cf33eb9b0f48c4f9407a0c6043360d6449606852bb7
                                          • Opcode Fuzzy Hash: 7df604a78376cedb70bbfc999d93982101a978bd2da9d243aad6b5fd79a701e3
                                          • Instruction Fuzzy Hash: F1712930644206BEFB319F68CC5AFAEBFA5FF01324F204226F5156A1E1C7B1A954DB90
                                          APIs
                                          • DestroyWindow.USER32(?,?), ref: 000F6DEB
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 000F6E5F
                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 000F6E81
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 000F6E94
                                          • DestroyWindow.USER32(?), ref: 000F6EB5
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00060000,00000000), ref: 000F6EE4
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 000F6EFD
                                          • GetDesktopWindow.USER32 ref: 000F6F16
                                          • GetWindowRect.USER32(00000000), ref: 000F6F1D
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 000F6F35
                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 000F6F4D
                                            • Part of subcall function 00079944: GetWindowLongW.USER32(?,000000EB), ref: 00079952
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                          • String ID: 0$tooltips_class32
                                          • API String ID: 2429346358-3619404913
                                          • Opcode ID: 4ba337036b97152313cbeb7c173d84eedb6060b5241df5869b8a876ebfce1dd0
                                          • Instruction ID: f4d391576c918c40954889be62b9ff2b2d749c79e6556aad4081c3aa9983d0f5
                                          • Opcode Fuzzy Hash: 4ba337036b97152313cbeb7c173d84eedb6060b5241df5869b8a876ebfce1dd0
                                          • Instruction Fuzzy Hash: 94717C71104248AFEB21CF18DC44FBABBE9FB89304F08042DFA8987661C775AD49EB11
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • DragQueryPoint.SHELL32(?,?), ref: 000F9147
                                            • Part of subcall function 000F7674: ClientToScreen.USER32(?,?), ref: 000F769A
                                            • Part of subcall function 000F7674: GetWindowRect.USER32(?,?), ref: 000F7710
                                            • Part of subcall function 000F7674: PtInRect.USER32(?,?,000F8B89), ref: 000F7720
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 000F91B0
                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 000F91BB
                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 000F91DE
                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 000F9225
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 000F923E
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 000F9255
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 000F9277
                                          • DragFinish.SHELL32(?), ref: 000F927E
                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 000F9371
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                          • API String ID: 221274066-3440237614
                                          • Opcode ID: 4cdf60fe743c86bd26700a88f5ed895536a82e71be68c4bba656bff419468942
                                          • Instruction ID: 627552209be8d4c8592517e0e8ccd90908cfbdf7fd7c88bedfd67dfcc263a2c1
                                          • Opcode Fuzzy Hash: 4cdf60fe743c86bd26700a88f5ed895536a82e71be68c4bba656bff419468942
                                          • Instruction Fuzzy Hash: 0C618971108304AFD701EF60DD85EAFBBE9EF88750F00092EF595925A1DB709A49DB52
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 000DC4B0
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 000DC4C3
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 000DC4D7
                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 000DC4F0
                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 000DC533
                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 000DC549
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 000DC554
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 000DC584
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 000DC5DC
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 000DC5F0
                                          • InternetCloseHandle.WININET(00000000), ref: 000DC5FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                          • String ID:
                                          • API String ID: 3800310941-3916222277
                                          • Opcode ID: 618f39c9e2f0ba45b3dcd1dc4a17dddf7c2289020e35db0739875ccc857eab65
                                          • Instruction ID: 1adfc3c0c3fa835b4401dc18e593c113278179b9b18c3e0d1d2415a520f12a1c
                                          • Opcode Fuzzy Hash: 618f39c9e2f0ba45b3dcd1dc4a17dddf7c2289020e35db0739875ccc857eab65
                                          • Instruction Fuzzy Hash: F65138B150070AAFFB219F609989EBA7BFCEB08744F00441AB94696610DB34E944EB70
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 000F8592
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85A2
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85AD
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85BA
                                          • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85C8
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85D7
                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85E0
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85E7
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 000F85F8
                                          • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,000FFC38,?), ref: 000F8611
                                          • GlobalFree.KERNEL32(00000000), ref: 000F8621
                                          • GetObjectW.GDI32(?,00000018,?), ref: 000F8641
                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 000F8671
                                          • DeleteObject.GDI32(?), ref: 000F8699
                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 000F86AF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                          • String ID:
                                          • API String ID: 3840717409-0
                                          • Opcode ID: f698e9ae40ff09ec0afbaf0737729b9730d0eea3c99aa1698479af11b47c9e5a
                                          • Instruction ID: aa0f6b5011b8f1a8808dd4976714367a9d8c86ab45d42577eaad7820b0ec21ac
                                          • Opcode Fuzzy Hash: f698e9ae40ff09ec0afbaf0737729b9730d0eea3c99aa1698479af11b47c9e5a
                                          • Instruction Fuzzy Hash: C5410975600208AFEB11DFA5CD49EBA7BB8FF89B51F108058F905EB660DB349901EB60
                                          APIs
                                          • VariantInit.OLEAUT32(00000000), ref: 000D1502
                                          • VariantCopy.OLEAUT32(?,?), ref: 000D150B
                                          • VariantClear.OLEAUT32(?), ref: 000D1517
                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 000D15FB
                                          • VarR8FromDec.OLEAUT32(?,?), ref: 000D1657
                                          • VariantInit.OLEAUT32(?), ref: 000D1708
                                          • SysFreeString.OLEAUT32(?), ref: 000D178C
                                          • VariantClear.OLEAUT32(?), ref: 000D17D8
                                          • VariantClear.OLEAUT32(?), ref: 000D17E7
                                          • VariantInit.OLEAUT32(00000000), ref: 000D1823
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                          • API String ID: 1234038744-3931177956
                                          • Opcode ID: e8f9bda64c81e5804dc6d6f71f2fd434003c8f92c5096d34810b990827673b47
                                          • Instruction ID: 60329311489bdfc1d384d07ba6dec3227ae5940a4a7fd35d71add03bfd17ac1f
                                          • Opcode Fuzzy Hash: e8f9bda64c81e5804dc6d6f71f2fd434003c8f92c5096d34810b990827673b47
                                          • Instruction Fuzzy Hash: 3AD1CC71A00A05EBEB209F65E885BFDB7B6BF45700F108056E416AB695DF38EC40DBA1
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000EB6AE,?,?), ref: 000EC9B5
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000EC9F1
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA68
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000EB6F4
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 000EB772
                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 000EB80A
                                          • RegCloseKey.ADVAPI32(?), ref: 000EB87E
                                          • RegCloseKey.ADVAPI32(?), ref: 000EB89C
                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 000EB8F2
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 000EB904
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 000EB922
                                          • FreeLibrary.KERNEL32(00000000), ref: 000EB983
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EB994
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 146587525-4033151799
                                          • Opcode ID: fee6280d4bbda68d65ae2d1fa985d5fedd7fd843fc23bb64564fafabc23f746e
                                          • Instruction ID: 4c26cccb72d9a364ba08cd74033091a40efb836fb55eb82e1e54b4655ca90701
                                          • Opcode Fuzzy Hash: fee6280d4bbda68d65ae2d1fa985d5fedd7fd843fc23bb64564fafabc23f746e
                                          • Instruction Fuzzy Hash: 96C1AC30208241AFE720DF15C495F6ABBE5BF84308F14849CE49A9B7A3CB75EC46CB91
                                          APIs
                                          • GetDC.USER32(00000000), ref: 000E25D8
                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 000E25E8
                                          • CreateCompatibleDC.GDI32(?), ref: 000E25F4
                                          • SelectObject.GDI32(00000000,?), ref: 000E2601
                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 000E266D
                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 000E26AC
                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 000E26D0
                                          • SelectObject.GDI32(?,?), ref: 000E26D8
                                          • DeleteObject.GDI32(?), ref: 000E26E1
                                          • DeleteDC.GDI32(?), ref: 000E26E8
                                          • ReleaseDC.USER32(00000000,?), ref: 000E26F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                          • String ID: (
                                          • API String ID: 2598888154-3887548279
                                          • Opcode ID: 22f61c1cced434682bd234e23d7756a586d96bad44e04b103065fa14a8202976
                                          • Instruction ID: c1db3acf8eeeb616bbb184c28fd64c2ed86dbea4ef802e0718f5315eab22bde2
                                          • Opcode Fuzzy Hash: 22f61c1cced434682bd234e23d7756a586d96bad44e04b103065fa14a8202976
                                          • Instruction Fuzzy Hash: 4E611175D00209EFDF04CFA8C985EAEBBB9FF48300F208529E955A7250D734A951DFA0
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 0009DAA1
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D659
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D66B
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D67D
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D68F
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6A1
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6B3
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6C5
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6D7
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6E9
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D6FB
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D70D
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D71F
                                            • Part of subcall function 0009D63C: _free.LIBCMT ref: 0009D731
                                          • _free.LIBCMT ref: 0009DA96
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 0009DAB8
                                          • _free.LIBCMT ref: 0009DACD
                                          • _free.LIBCMT ref: 0009DAD8
                                          • _free.LIBCMT ref: 0009DAFA
                                          • _free.LIBCMT ref: 0009DB0D
                                          • _free.LIBCMT ref: 0009DB1B
                                          • _free.LIBCMT ref: 0009DB26
                                          • _free.LIBCMT ref: 0009DB5E
                                          • _free.LIBCMT ref: 0009DB65
                                          • _free.LIBCMT ref: 0009DB82
                                          • _free.LIBCMT ref: 0009DB9A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: 2d9f63288a56c09878782a5a310584c8bb788f4aaccf8a9d76ed390055043066
                                          • Instruction ID: d7d0c5c6b1a32dff7a208a500923ea75f75dbff2d4b5eb0591e0c95c4c0986ab
                                          • Opcode Fuzzy Hash: 2d9f63288a56c09878782a5a310584c8bb788f4aaccf8a9d76ed390055043066
                                          • Instruction Fuzzy Hash: 1E318D31684305EFEF61AA39E845B9AB7E9FF10320F51441AE488D7192DF31EC50E760
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000100), ref: 000C369C
                                          • _wcslen.LIBCMT ref: 000C36A7
                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 000C3797
                                          • GetClassNameW.USER32(?,?,00000400), ref: 000C380C
                                          • GetDlgCtrlID.USER32(?), ref: 000C385D
                                          • GetWindowRect.USER32(?,?), ref: 000C3882
                                          • GetParent.USER32(?), ref: 000C38A0
                                          • ScreenToClient.USER32(00000000), ref: 000C38A7
                                          • GetClassNameW.USER32(?,?,00000100), ref: 000C3921
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 000C395D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                          • String ID: %s%u
                                          • API String ID: 4010501982-679674701
                                          • Opcode ID: 6273feb5cd925072d5aff5e60ed01520298e874d10cb1705f5e49e8c5e09ce72
                                          • Instruction ID: 32ddb1a9c937f25c311f5e1e7af4038873214222d3b83d4af3279b462d76d6b2
                                          • Opcode Fuzzy Hash: 6273feb5cd925072d5aff5e60ed01520298e874d10cb1705f5e49e8c5e09ce72
                                          • Instruction Fuzzy Hash: 6291AC71214606AFDB18DF24C885FEEB7E8FF44350F00862DF999D2191DB34AA49CB91
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000400), ref: 000C4994
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 000C49DA
                                          • _wcslen.LIBCMT ref: 000C49EB
                                          • CharUpperBuffW.USER32(?,00000000), ref: 000C49F7
                                          • _wcsstr.LIBVCRUNTIME ref: 000C4A2C
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 000C4A64
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 000C4A9D
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 000C4AE6
                                          • GetClassNameW.USER32(?,?,00000400), ref: 000C4B20
                                          • GetWindowRect.USER32(?,?), ref: 000C4B8B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                          • String ID: ThumbnailClass
                                          • API String ID: 1311036022-1241985126
                                          • Opcode ID: 15f865f23e250ba49c35ebe1a7a62e5e79a9abdd77b03dc2b0da926635fb724d
                                          • Instruction ID: f8f97fbdf640933fe6fc64aaf5a468dc59df8afec25700833933fb3749579753
                                          • Opcode Fuzzy Hash: 15f865f23e250ba49c35ebe1a7a62e5e79a9abdd77b03dc2b0da926635fb724d
                                          • Instruction Fuzzy Hash: 8E9189710082099BEB04DF14C995FAE77E8FF84314F04846DFD859A1A6DB34ED45CBA2
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 000F8D5A
                                          • GetFocus.USER32 ref: 000F8D6A
                                          • GetDlgCtrlID.USER32(00000000), ref: 000F8D75
                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 000F8E1D
                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 000F8ECF
                                          • GetMenuItemCount.USER32(?), ref: 000F8EEC
                                          • GetMenuItemID.USER32(?,00000000), ref: 000F8EFC
                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 000F8F2E
                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 000F8F70
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 000F8FA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                          • String ID: 0
                                          • API String ID: 1026556194-4108050209
                                          • Opcode ID: 3b12c9d1b1b0e54b75f20a0f757f8b2a13448ef3d4eb2a76a12526810bbdd8c7
                                          • Instruction ID: 1b91bd8aa92e753608a4ca9d844d213c8a9cf8d1036e7d3bff338b7b6520eefb
                                          • Opcode Fuzzy Hash: 3b12c9d1b1b0e54b75f20a0f757f8b2a13448ef3d4eb2a76a12526810bbdd8c7
                                          • Instruction Fuzzy Hash: 8781BF71508309AFE710CF14C885AFB7BE9FF88714F048969FA8597A92DB30D944EB61
                                          APIs
                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 000CDC20
                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 000CDC46
                                          • _wcslen.LIBCMT ref: 000CDC50
                                          • _wcsstr.LIBVCRUNTIME ref: 000CDCA0
                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 000CDCBC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                          • API String ID: 1939486746-1459072770
                                          • Opcode ID: 0bb1055556d93335e3e58e1c85dbd58487dad77f2c0cf1fda13ae73ef2fc71cd
                                          • Instruction ID: d9c283249cf0dbb8d71689849a15fb7631800bc7894fd59ba18ae465e638d65c
                                          • Opcode Fuzzy Hash: 0bb1055556d93335e3e58e1c85dbd58487dad77f2c0cf1fda13ae73ef2fc71cd
                                          • Instruction Fuzzy Hash: 0B412F329402097AEB10B7649C47FFF37ACEF52710F10406AFA05A6193EB789900ABA5
                                          APIs
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 000ECC64
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 000ECC8D
                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 000ECD48
                                            • Part of subcall function 000ECC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 000ECCAA
                                            • Part of subcall function 000ECC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 000ECCBD
                                            • Part of subcall function 000ECC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 000ECCCF
                                            • Part of subcall function 000ECC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 000ECD05
                                            • Part of subcall function 000ECC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 000ECD28
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 000ECCF3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 2734957052-4033151799
                                          • Opcode ID: 3882e3098319d5f2d12e415f55823434b2468e7521a841772c0d4023344fa277
                                          • Instruction ID: d72f8a90ab629d0ee761858e796009bface85f40a4144e55e4a37614d0486e62
                                          • Opcode Fuzzy Hash: 3882e3098319d5f2d12e415f55823434b2468e7521a841772c0d4023344fa277
                                          • Instruction Fuzzy Hash: 56316E7190112DBFFB208B55DC89EFFBBBCEF56750F000165E905E2240DB359A46EAA0
                                          APIs
                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 000D3D40
                                          • _wcslen.LIBCMT ref: 000D3D6D
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 000D3D9D
                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 000D3DBE
                                          • RemoveDirectoryW.KERNEL32(?), ref: 000D3DCE
                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 000D3E55
                                          • CloseHandle.KERNEL32(00000000), ref: 000D3E60
                                          • CloseHandle.KERNEL32(00000000), ref: 000D3E6B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                          • String ID: :$\$\??\%s
                                          • API String ID: 1149970189-3457252023
                                          • Opcode ID: fc83bd37a5d6367295aa968982adf02719dee8431114fde50ba197312c1f231c
                                          • Instruction ID: d961ceb6f1f2246b25a5c3ed87146e0c76672d1aa24b8c2eabeb5f5c660e907e
                                          • Opcode Fuzzy Hash: fc83bd37a5d6367295aa968982adf02719dee8431114fde50ba197312c1f231c
                                          • Instruction Fuzzy Hash: 3B319071900209AAEB209BA0EC49FEF37BDEF89740F1041B6F509D61A1E7749744DB35
                                          APIs
                                          • timeGetTime.WINMM ref: 000CE6B4
                                            • Part of subcall function 0007E551: timeGetTime.WINMM(?,?,000CE6D4), ref: 0007E555
                                          • Sleep.KERNEL32(0000000A), ref: 000CE6E1
                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 000CE705
                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 000CE727
                                          • SetActiveWindow.USER32 ref: 000CE746
                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 000CE754
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 000CE773
                                          • Sleep.KERNEL32(000000FA), ref: 000CE77E
                                          • IsWindow.USER32 ref: 000CE78A
                                          • EndDialog.USER32(00000000), ref: 000CE79B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                          • String ID: BUTTON
                                          • API String ID: 1194449130-3405671355
                                          • Opcode ID: 18315aafac8813e4df2ff8cbb35c3d1c9646c56b804a85d372e91d38b4471e33
                                          • Instruction ID: 733b16c5bc21965c62021ac0f2ee5715c86d6982bf6858469c523e61a9736367
                                          • Opcode Fuzzy Hash: 18315aafac8813e4df2ff8cbb35c3d1c9646c56b804a85d372e91d38b4471e33
                                          • Instruction Fuzzy Hash: C42193B1204688AFFB106F61ED8BF3D3BA9FB55748F205428F905C19B1DB75AC50EA24
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 000CEA5D
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 000CEA73
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 000CEA84
                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 000CEA96
                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 000CEAA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: SendString$_wcslen
                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                          • API String ID: 2420728520-1007645807
                                          • Opcode ID: b9d68b2756fbaab2a56aadb3259eda695fa2758bf3d0f766257291599c1886d7
                                          • Instruction ID: 7c8b8aa7fb3f90a4834e22ddd7ea3f64c0295763229398b0667d0a5f62c803c3
                                          • Opcode Fuzzy Hash: b9d68b2756fbaab2a56aadb3259eda695fa2758bf3d0f766257291599c1886d7
                                          • Instruction Fuzzy Hash: B2115631A902697DDB20A7A1ED4AEFF6ABCEFD2B04F4004297411A20D1EF705E55C9B1
                                          APIs
                                          • GetDlgItem.USER32(?,00000001), ref: 000C5CE2
                                          • GetWindowRect.USER32(00000000,?), ref: 000C5CFB
                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 000C5D59
                                          • GetDlgItem.USER32(?,00000002), ref: 000C5D69
                                          • GetWindowRect.USER32(00000000,?), ref: 000C5D7B
                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 000C5DCF
                                          • GetDlgItem.USER32(?,000003E9), ref: 000C5DDD
                                          • GetWindowRect.USER32(00000000,?), ref: 000C5DEF
                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 000C5E31
                                          • GetDlgItem.USER32(?,000003EA), ref: 000C5E44
                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 000C5E5A
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 000C5E67
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ItemMoveRect$Invalidate
                                          • String ID:
                                          • API String ID: 3096461208-0
                                          • Opcode ID: 7b0618807ee4b930a0e3a4954fde7c4aeeb9f0f0caca823a53c20b6de58f06b0
                                          • Instruction ID: 39c358436396f98840f90bcb39e76d0b15c089951f899cb717e99a26ed229dd4
                                          • Opcode Fuzzy Hash: 7b0618807ee4b930a0e3a4954fde7c4aeeb9f0f0caca823a53c20b6de58f06b0
                                          • Instruction Fuzzy Hash: 47511F74A00609AFEF18CF68DD8AEAE7BB5EB48301F108129F516E7690D774AE40CB50
                                          APIs
                                            • Part of subcall function 00078F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00078BE8,?,00000000,?,?,?,?,00078BBA,00000000,?), ref: 00078FC5
                                          • DestroyWindow.USER32(?), ref: 00078C81
                                          • KillTimer.USER32(00000000,?,?,?,?,00078BBA,00000000,?), ref: 00078D1B
                                          • DestroyAcceleratorTable.USER32(00000000), ref: 000B6973
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00078BBA,00000000,?), ref: 000B69A1
                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00078BBA,00000000,?), ref: 000B69B8
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00078BBA,00000000), ref: 000B69D4
                                          • DeleteObject.GDI32(00000000), ref: 000B69E6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                          • String ID:
                                          • API String ID: 641708696-0
                                          • Opcode ID: 28429eec086bfa4135487b7968a80e5d5f4992b6a7fa9a0ff8442b79301c88ca
                                          • Instruction ID: 143f5e96b093a366e5a00d450dcc162938261167eadd394dcbd0eb1d77abe640
                                          • Opcode Fuzzy Hash: 28429eec086bfa4135487b7968a80e5d5f4992b6a7fa9a0ff8442b79301c88ca
                                          • Instruction Fuzzy Hash: 7D618C30901604EFEB369F14CA4DB69B7F1FB40316F14C52CE04696960CB3AAC90DF99
                                          APIs
                                            • Part of subcall function 00079944: GetWindowLongW.USER32(?,000000EB), ref: 00079952
                                          • GetSysColor.USER32(0000000F), ref: 00079862
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ColorLongWindow
                                          • String ID:
                                          • API String ID: 259745315-0
                                          • Opcode ID: 66d2515bac2e371a6a372811da64def18010c74089f1134e49c0bda37970b474
                                          • Instruction ID: 671ec7624e915adc744c59630204c3d02d11f8e87e90366b027a600d80f22073
                                          • Opcode Fuzzy Hash: 66d2515bac2e371a6a372811da64def18010c74089f1134e49c0bda37970b474
                                          • Instruction Fuzzy Hash: E441F631504644AFEB709F389C85BB937A5FB47330F148655F9AA872E1CB399C41DB21
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,000AF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 000C9717
                                          • LoadStringW.USER32(00000000,?,000AF7F8,00000001), ref: 000C9720
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,000AF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 000C9742
                                          • LoadStringW.USER32(00000000,?,000AF7F8,00000001), ref: 000C9745
                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 000C9866
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                          • API String ID: 747408836-2268648507
                                          • Opcode ID: 6247d1d697fb8b8bc912d38871cb4386145d268d0fb28fc6cf5daa18b23049b1
                                          • Instruction ID: f0ac505f02d032746b3a6c1e739b2d9da27c6c6d6c93579a14e0847a431caf40
                                          • Opcode Fuzzy Hash: 6247d1d697fb8b8bc912d38871cb4386145d268d0fb28fc6cf5daa18b23049b1
                                          • Instruction Fuzzy Hash: 5C412C72900219AADB04FBE0DE86EEE7779AF55340F500065F60572193EF356F48DBA1
                                          APIs
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 000C07A2
                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 000C07BE
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 000C07DA
                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 000C0804
                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 000C082C
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 000C0837
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 000C083C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                          • API String ID: 323675364-22481851
                                          • Opcode ID: 6a6fa81569f80bf2f5969dd91ca88d547cb0f5ac1c847775defa9603d8f545fe
                                          • Instruction ID: 73c71e3e9ca68248b9a53350dcb8598b9d7e2b9cdc380b4bd89c57db31f611a3
                                          • Opcode Fuzzy Hash: 6a6fa81569f80bf2f5969dd91ca88d547cb0f5ac1c847775defa9603d8f545fe
                                          • Instruction Fuzzy Hash: 84410572D10229EBDF15EBA4DC95DEDB7B9BF04750B144129E901B3161EB30AE44CBA0
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 000E3C5C
                                          • CoInitialize.OLE32(00000000), ref: 000E3C8A
                                          • CoUninitialize.OLE32 ref: 000E3C94
                                          • _wcslen.LIBCMT ref: 000E3D2D
                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 000E3DB1
                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 000E3ED5
                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 000E3F0E
                                          • CoGetObject.OLE32(?,00000000,000FFB98,?), ref: 000E3F2D
                                          • SetErrorMode.KERNEL32(00000000), ref: 000E3F40
                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 000E3FC4
                                          • VariantClear.OLEAUT32(?), ref: 000E3FD8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                          • String ID:
                                          • API String ID: 429561992-0
                                          • Opcode ID: 5672c61ff86f33d746930f266fefde7e5367904eb5c5345c5a3b01e14993cf6c
                                          • Instruction ID: 07c174fa1d719bb0fb9902718885c917794c3b6d3661ab77721ca1591226420b
                                          • Opcode Fuzzy Hash: 5672c61ff86f33d746930f266fefde7e5367904eb5c5345c5a3b01e14993cf6c
                                          • Instruction Fuzzy Hash: 69C176716083459FD700DF29C88896BBBE9FF89744F10492DF98AAB251DB31EE05CB52
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 000D7AF3
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 000D7B8F
                                          • SHGetDesktopFolder.SHELL32(?), ref: 000D7BA3
                                          • CoCreateInstance.OLE32(000FFD08,00000000,00000001,00126E6C,?), ref: 000D7BEF
                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 000D7C74
                                          • CoTaskMemFree.OLE32(?,?), ref: 000D7CCC
                                          • SHBrowseForFolderW.SHELL32(?), ref: 000D7D57
                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 000D7D7A
                                          • CoTaskMemFree.OLE32(00000000), ref: 000D7D81
                                          • CoTaskMemFree.OLE32(00000000), ref: 000D7DD6
                                          • CoUninitialize.OLE32 ref: 000D7DDC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                          • String ID:
                                          • API String ID: 2762341140-0
                                          • Opcode ID: 32c618507c16f18738fff6a522139f24f865f342c7f45a0bf01dec54dab1b73f
                                          • Instruction ID: 67da072f517c7347a5a22a7401b7da7cd181228d0a9a09468a86d7c6dca4fb2c
                                          • Opcode Fuzzy Hash: 32c618507c16f18738fff6a522139f24f865f342c7f45a0bf01dec54dab1b73f
                                          • Instruction Fuzzy Hash: 34C12D75A04209AFDB14DF64C884DAEBBF9FF48314B148499E41ADB762DB30ED45CBA0
                                          APIs
                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 000F5504
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 000F5515
                                          • CharNextW.USER32(00000158), ref: 000F5544
                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 000F5585
                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 000F559B
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 000F55AC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$CharNext
                                          • String ID:
                                          • API String ID: 1350042424-0
                                          • Opcode ID: 34bcb4a352540d674ed30dff3dd01b7be3c55ea408a4e3f61d3bae0bd8bb1c2d
                                          • Instruction ID: 9ab7ee73c36cdde67d16e8040b42caa58bed30b707f6c7ea6733b3375b7a76af
                                          • Opcode Fuzzy Hash: 34bcb4a352540d674ed30dff3dd01b7be3c55ea408a4e3f61d3bae0bd8bb1c2d
                                          • Instruction Fuzzy Hash: F7618F30904A0CABEF20DF54CC85DFE7BB9EB05726F108145FB25A6A91D7749A81EB60
                                          APIs
                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 000BFAAF
                                          • SafeArrayAllocData.OLEAUT32(?), ref: 000BFB08
                                          • VariantInit.OLEAUT32(?), ref: 000BFB1A
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 000BFB3A
                                          • VariantCopy.OLEAUT32(?,?), ref: 000BFB8D
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 000BFBA1
                                          • VariantClear.OLEAUT32(?), ref: 000BFBB6
                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 000BFBC3
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 000BFBCC
                                          • VariantClear.OLEAUT32(?), ref: 000BFBDE
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 000BFBE9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                          • String ID:
                                          • API String ID: 2706829360-0
                                          • Opcode ID: b343301f4ab0491ae70aed872085c2e349ba40fb2c3d88c12346b7d9972dbd37
                                          • Instruction ID: d8e38264d2beb17aad53dd7f773d4f17b9627e1837448b383460944d09a930c8
                                          • Opcode Fuzzy Hash: b343301f4ab0491ae70aed872085c2e349ba40fb2c3d88c12346b7d9972dbd37
                                          • Instruction Fuzzy Hash: 4C416E35A0021A9FEB04DF64CC55DFEBBB9EF48344F008469E945A7261CB74A945CBA0
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 000C9CA1
                                          • GetAsyncKeyState.USER32(000000A0), ref: 000C9D22
                                          • GetKeyState.USER32(000000A0), ref: 000C9D3D
                                          • GetAsyncKeyState.USER32(000000A1), ref: 000C9D57
                                          • GetKeyState.USER32(000000A1), ref: 000C9D6C
                                          • GetAsyncKeyState.USER32(00000011), ref: 000C9D84
                                          • GetKeyState.USER32(00000011), ref: 000C9D96
                                          • GetAsyncKeyState.USER32(00000012), ref: 000C9DAE
                                          • GetKeyState.USER32(00000012), ref: 000C9DC0
                                          • GetAsyncKeyState.USER32(0000005B), ref: 000C9DD8
                                          • GetKeyState.USER32(0000005B), ref: 000C9DEA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: 4552de8713b46880cd65f46af759cc469b40f1439983da9d060db10a42350351
                                          • Instruction ID: 37b2f7724dcb869f7f8286ecbb70fe251f2a4bea7986f0e53b9a0055929ddd58
                                          • Opcode Fuzzy Hash: 4552de8713b46880cd65f46af759cc469b40f1439983da9d060db10a42350351
                                          • Instruction Fuzzy Hash: BF41D674504BC969FFB08760984CBBDBEE06F21344F04805EDAC7665C2DBE49AC8D7A2
                                          APIs
                                          • WSAStartup.WSOCK32(00000101,?), ref: 000E05BC
                                          • inet_addr.WSOCK32(?), ref: 000E061C
                                          • gethostbyname.WSOCK32(?), ref: 000E0628
                                          • IcmpCreateFile.IPHLPAPI ref: 000E0636
                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 000E06C6
                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 000E06E5
                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 000E07B9
                                          • WSACleanup.WSOCK32 ref: 000E07BF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                          • String ID: Ping
                                          • API String ID: 1028309954-2246546115
                                          • Opcode ID: 34f7c96628d74149d9d9d89a8e364d8b6933d4685988396f55d779460d5bc998
                                          • Instruction ID: 3f98e7ea25e59592b6a4fbc160ec26ea65da01ce914571be4ff8f968a9317f5c
                                          • Opcode Fuzzy Hash: 34f7c96628d74149d9d9d89a8e364d8b6933d4685988396f55d779460d5bc998
                                          • Instruction Fuzzy Hash: D691B1359082419FD320CF16C989F1ABBE1AF44318F1485A9F4A99B6A2C7B4FD85CF91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharLower
                                          • String ID: cdecl$none$stdcall$winapi
                                          • API String ID: 707087890-567219261
                                          • Opcode ID: ad28ebaab82d9db2b37cd199f9348df43f260023ee17c78228c001355bcf214a
                                          • Instruction ID: db27ed321ceef7795368ea492a46a5382f04e184ebeb38d33aa1a0d78cb1ade3
                                          • Opcode Fuzzy Hash: ad28ebaab82d9db2b37cd199f9348df43f260023ee17c78228c001355bcf214a
                                          • Instruction Fuzzy Hash: DB51AF31A045569FCB24DF69C9409BEB3E6BF64320B218229E46AF73C5DB31DE40C790
                                          APIs
                                          • CoInitialize.OLE32 ref: 000E3774
                                          • CoUninitialize.OLE32 ref: 000E377F
                                          • CoCreateInstance.OLE32(?,00000000,00000017,000FFB78,?), ref: 000E37D9
                                          • IIDFromString.OLE32(?,?), ref: 000E384C
                                          • VariantInit.OLEAUT32(?), ref: 000E38E4
                                          • VariantClear.OLEAUT32(?), ref: 000E3936
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                          • API String ID: 636576611-1287834457
                                          • Opcode ID: 10d04dd581e74f99b8956035cf35eeb74aa1f64272317d617aff664c2d31a345
                                          • Instruction ID: 4aafdd736c371f65dce06bbdd9df900a5c225322b15366021fa7a432a23c0741
                                          • Opcode Fuzzy Hash: 10d04dd581e74f99b8956035cf35eeb74aa1f64272317d617aff664c2d31a345
                                          • Instruction Fuzzy Hash: 5F61AF70608341AFD320DF55C949FAEBBE8AF45714F100859F585A7292CB70EE48CB92
                                          APIs
                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 000D33CF
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 000D33F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LoadString$_wcslen
                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 4099089115-3080491070
                                          • Opcode ID: eff92f4db08c180fc7eb31ad19dcf7573c16dd10a2fdc15c824a27f30193df1b
                                          • Instruction ID: 6f0a48279e499d551550a185b144d60b88a428c5fc5f228ba8b3290e81f19194
                                          • Opcode Fuzzy Hash: eff92f4db08c180fc7eb31ad19dcf7573c16dd10a2fdc15c824a27f30193df1b
                                          • Instruction Fuzzy Hash: DE518C32900219BADF15EBA0DE46EEEB7B9EF14340F104065F505721A2EB352F98DBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                          • API String ID: 1256254125-769500911
                                          • Opcode ID: 7433c7778581a41331a8f614f478a5ce8163d0df55fee62c486cc83bc3d010a9
                                          • Instruction ID: 7c890118b19e01840755e2ae0c249e5c13a88215fda12cd8aa90aca90e418ac3
                                          • Opcode Fuzzy Hash: 7433c7778581a41331a8f614f478a5ce8163d0df55fee62c486cc83bc3d010a9
                                          • Instruction Fuzzy Hash: 7D41B432A000279BCB606F7DC992ABE77E5AB60754F25422DE865D7284E739CD81C790
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 000D53A0
                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 000D5416
                                          • GetLastError.KERNEL32 ref: 000D5420
                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 000D54A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Error$Mode$DiskFreeLastSpace
                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                          • API String ID: 4194297153-14809454
                                          • Opcode ID: e08c8aed124256721fdb98d4d95e870b831fead112eff71627bd3576ca67ff68
                                          • Instruction ID: e12d01d3106e2f16fc1b20c64f141463091d214df9407c54bdc08b9ca1512bc5
                                          • Opcode Fuzzy Hash: e08c8aed124256721fdb98d4d95e870b831fead112eff71627bd3576ca67ff68
                                          • Instruction Fuzzy Hash: 1931A235A006089FD750DF68C985EEA7BF4EF4530AF14806AE805DB392D770DD82CBA2
                                          APIs
                                          • CreateMenu.USER32 ref: 000F3C79
                                          • SetMenu.USER32(?,00000000), ref: 000F3C88
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 000F3D10
                                          • IsMenu.USER32(?), ref: 000F3D24
                                          • CreatePopupMenu.USER32 ref: 000F3D2E
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 000F3D5B
                                          • DrawMenuBar.USER32 ref: 000F3D63
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                          • String ID: 0$F
                                          • API String ID: 161812096-3044882817
                                          • Opcode ID: d290fae132313d49a56bffedb5da8cf674f5a509bce9b6ed6108e1725cb52247
                                          • Instruction ID: 487e6150eba5a419b90389469b6826481ed0def72d50a4782cce193d1c14ea29
                                          • Opcode Fuzzy Hash: d290fae132313d49a56bffedb5da8cf674f5a509bce9b6ed6108e1725cb52247
                                          • Instruction Fuzzy Hash: 04418874A01209EFEB14DF64E844EEA7BF5FF49320F140028EA46A7760D730AA10EF90
                                          APIs
                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 000F3A9D
                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 000F3AA0
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F3AC7
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 000F3AEA
                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 000F3B62
                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 000F3BAC
                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 000F3BC7
                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 000F3BE2
                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 000F3BF6
                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 000F3C13
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow
                                          • String ID:
                                          • API String ID: 312131281-0
                                          • Opcode ID: e332aea036a71daaa1d1e7002d3e0ee106d2715db31236c14bd69dd41e55a140
                                          • Instruction ID: 81f22ef1d527b922de69a81e46765b3b73c17702c7c59cc5998405d74a4ab783
                                          • Opcode Fuzzy Hash: e332aea036a71daaa1d1e7002d3e0ee106d2715db31236c14bd69dd41e55a140
                                          • Instruction Fuzzy Hash: 1B615A75900248AFDB10DFA8CC81EFE77F8EB09714F104199FA15E72A2D774AA85EB50
                                          APIs
                                          • _free.LIBCMT ref: 00092C94
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 00092CA0
                                          • _free.LIBCMT ref: 00092CAB
                                          • _free.LIBCMT ref: 00092CB6
                                          • _free.LIBCMT ref: 00092CC1
                                          • _free.LIBCMT ref: 00092CCC
                                          • _free.LIBCMT ref: 00092CD7
                                          • _free.LIBCMT ref: 00092CE2
                                          • _free.LIBCMT ref: 00092CED
                                          • _free.LIBCMT ref: 00092CFB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 76290656d0924c6988d6a14fa68065e2dafbdc28ea24ba198b538050e83ace79
                                          • Instruction ID: 2a92286bcfd8d667dbaeafd5aceaf0ac068a282f7ae9677fdb001fe547bdb63d
                                          • Opcode Fuzzy Hash: 76290656d0924c6988d6a14fa68065e2dafbdc28ea24ba198b538050e83ace79
                                          • Instruction Fuzzy Hash: D3114076510108BFCF02EF94D982CDD3BA9FF05350F9145A5FA889B222DA31EA50AB90
                                          APIs
                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00061459
                                          • OleUninitialize.OLE32(?,00000000), ref: 000614F8
                                          • UnregisterHotKey.USER32(?), ref: 000616DD
                                          • DestroyWindow.USER32(?), ref: 000A24B9
                                          • FreeLibrary.KERNEL32(?), ref: 000A251E
                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 000A254B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                          • String ID: close all
                                          • API String ID: 469580280-3243417748
                                          • Opcode ID: 388808edc2409da25446b07e6588a2d866bcec0558f47ffe32bc4846083fd451
                                          • Instruction ID: f66c2cc64fd26c922195a8aa7ef5f13403fe0541366eda1c6727592e66fe72f2
                                          • Opcode Fuzzy Hash: 388808edc2409da25446b07e6588a2d866bcec0558f47ffe32bc4846083fd451
                                          • Instruction Fuzzy Hash: 41D19031B01212CFDB29EF69C599EA9F7A5BF05700F1841ADE44A6B252DB30ED12CF51
                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 000D7FAD
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D7FC1
                                          • GetFileAttributesW.KERNEL32(?), ref: 000D7FEB
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 000D8005
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D8017
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 000D8060
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 000D80B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$AttributesFile
                                          • String ID: *.*
                                          • API String ID: 769691225-438819550
                                          • Opcode ID: 0e3278437197dfd1beab94652897e75a31d7cce046a7075ae066e7b492344d30
                                          • Instruction ID: 6e3d2a15cdda8e9434d3e90aa5680ca5d50ff4538f9763104020c4636e5bf49b
                                          • Opcode Fuzzy Hash: 0e3278437197dfd1beab94652897e75a31d7cce046a7075ae066e7b492344d30
                                          • Instruction Fuzzy Hash: A3819E725083419BDB64EF14C844AAEB7E9BF88314F54486FF889C7351EB34DD458B62
                                          APIs
                                          • SetWindowLongW.USER32(?,000000EB), ref: 00065C7A
                                            • Part of subcall function 00065D0A: GetClientRect.USER32(?,?), ref: 00065D30
                                            • Part of subcall function 00065D0A: GetWindowRect.USER32(?,?), ref: 00065D71
                                            • Part of subcall function 00065D0A: ScreenToClient.USER32(?,?), ref: 00065D99
                                          • GetDC.USER32 ref: 000A46F5
                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 000A4708
                                          • SelectObject.GDI32(00000000,00000000), ref: 000A4716
                                          • SelectObject.GDI32(00000000,00000000), ref: 000A472B
                                          • ReleaseDC.USER32(?,00000000), ref: 000A4733
                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 000A47C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                          • String ID: U
                                          • API String ID: 4009187628-3372436214
                                          • Opcode ID: bdd404fcfb433f482cf76a6b76fecb8ff8354ee13bffb6038a5c87ede394b551
                                          • Instruction ID: ddaea051ceab56f886917b9825d9cbf904aaeb4975178434924bf7080608e8db
                                          • Opcode Fuzzy Hash: bdd404fcfb433f482cf76a6b76fecb8ff8354ee13bffb6038a5c87ede394b551
                                          • Instruction Fuzzy Hash: D771EE38404249DFCF618FA4CD85AFE7BF2FF8A321F144269E9555A2A6C7B08881DF50
                                          APIs
                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 000D35E4
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • LoadStringW.USER32(00132390,?,00000FFF,?), ref: 000D360A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LoadString$_wcslen
                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 4099089115-2391861430
                                          • Opcode ID: 6338928ba708ffdc78cf0af376d44e27e93e38d08febdce66d165e17c22ef862
                                          • Instruction ID: b5e659b2adf2626a2d3e9400ba86f07ffdf651ff7ac7cafc32b7711004c43605
                                          • Opcode Fuzzy Hash: 6338928ba708ffdc78cf0af376d44e27e93e38d08febdce66d165e17c22ef862
                                          • Instruction Fuzzy Hash: 11517E72800219BBDF14EBA0DD42EEEBB79EF14310F144125F505726A2EB316B99DFA1
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                            • Part of subcall function 0007912D: GetCursorPos.USER32(?), ref: 00079141
                                            • Part of subcall function 0007912D: ScreenToClient.USER32(00000000,?), ref: 0007915E
                                            • Part of subcall function 0007912D: GetAsyncKeyState.USER32(00000001), ref: 00079183
                                            • Part of subcall function 0007912D: GetAsyncKeyState.USER32(00000002), ref: 0007919D
                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 000F8B6B
                                          • ImageList_EndDrag.COMCTL32 ref: 000F8B71
                                          • ReleaseCapture.USER32 ref: 000F8B77
                                          • SetWindowTextW.USER32(?,00000000), ref: 000F8C12
                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 000F8C25
                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 000F8CFF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                          • API String ID: 1924731296-2107944366
                                          • Opcode ID: 5a1c657167f8eff615d0a9f44f162c2578d48e72cbe0738af1a19bd1a11040ba
                                          • Instruction ID: 7856e2ab25867f9cf8292df7e747583223df62dc9d9c5bf5b69879f1b89d58e3
                                          • Opcode Fuzzy Hash: 5a1c657167f8eff615d0a9f44f162c2578d48e72cbe0738af1a19bd1a11040ba
                                          • Instruction Fuzzy Hash: 3E517C70204208AFE700DF14DD56FBA77E5FB88714F40052DFA56976E2CB749944DBA2
                                          APIs
                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 000DC272
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 000DC29A
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 000DC2CA
                                          • GetLastError.KERNEL32 ref: 000DC322
                                          • SetEvent.KERNEL32(?), ref: 000DC336
                                          • InternetCloseHandle.WININET(00000000), ref: 000DC341
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                          • String ID:
                                          • API String ID: 3113390036-3916222277
                                          • Opcode ID: a9b52b0aa5c00eeb543829157ee48a9a2184e0b8eee91a922a83eef4df793583
                                          • Instruction ID: b454627e3b21f0773ba6c6f6d949786e33b63362148220d1e5b9fd17961493d3
                                          • Opcode Fuzzy Hash: a9b52b0aa5c00eeb543829157ee48a9a2184e0b8eee91a922a83eef4df793583
                                          • Instruction Fuzzy Hash: F3317AB1604309AFFB61AF648989EBB7AFCEB49740B14851EB44692701DB34DE04DB70
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,000A3AAF,?,?,Bad directive syntax error,000FCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 000C98BC
                                          • LoadStringW.USER32(00000000,?,000A3AAF,?), ref: 000C98C3
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 000C9987
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HandleLoadMessageModuleString_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                          • API String ID: 858772685-4153970271
                                          • Opcode ID: 4eaf1d5d055f395780b834af82dfefc73f5e7730b8b2f92ba917003d7d86f8ca
                                          • Instruction ID: a7920d79a49a727380e7d4df7d46f3012ed4da97a4eb4d6983303e6bc1473153
                                          • Opcode Fuzzy Hash: 4eaf1d5d055f395780b834af82dfefc73f5e7730b8b2f92ba917003d7d86f8ca
                                          • Instruction Fuzzy Hash: 9C217E3180025EABDF11AF90CC0AEFE777AFF18700F044469F519660A2EB359A28DB50
                                          APIs
                                          • GetParent.USER32 ref: 000C20AB
                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 000C20C0
                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 000C214D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameParentSend
                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                          • API String ID: 1290815626-3381328864
                                          • Opcode ID: 611fe14b9cde8d70aee4a339e5ca3512fbaa502835a84b2e032aaf86ca8c0888
                                          • Instruction ID: 9a558171fded584989d3df3bf4f6e89642619c4c96bea5a2cd3e360b43f88851
                                          • Opcode Fuzzy Hash: 611fe14b9cde8d70aee4a339e5ca3512fbaa502835a84b2e032aaf86ca8c0888
                                          • Instruction Fuzzy Hash: 6B11E376688717B9FA153720AC07EEE379DDB25324B20002AFF04A94E2EAB568115A14
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                          • String ID:
                                          • API String ID: 1282221369-0
                                          • Opcode ID: 7f789ce0e169f7b0cff0c6c6d416129a1f9933589fd88aa951bd248266c174c5
                                          • Instruction ID: f6966bb917b27f0ef6cdf494cd71f0a3b75f5471c102680e00f8f0ec2b274bb7
                                          • Opcode Fuzzy Hash: 7f789ce0e169f7b0cff0c6c6d416129a1f9933589fd88aa951bd248266c174c5
                                          • Instruction Fuzzy Hash: 64612771D04305AFEF22AFB498A1EAE7BE5EF05350F04417EF94597282D7319E41A790
                                          APIs
                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 000F5186
                                          • ShowWindow.USER32(?,00000000), ref: 000F51C7
                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 000F51CD
                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 000F51D1
                                            • Part of subcall function 000F6FBA: DeleteObject.GDI32(00000000), ref: 000F6FE6
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F520D
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000F521A
                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 000F524D
                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 000F5287
                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 000F5296
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                          • String ID:
                                          • API String ID: 3210457359-0
                                          • Opcode ID: bf95b114f3e301f4c7e10d4dda69e051b70c165c8fb1ad695ed97dd89d9f6314
                                          • Instruction ID: d63fcd1eead2bb6ec94486abae67cfa48236bf0500dc34223573bb7e75c46e53
                                          • Opcode Fuzzy Hash: bf95b114f3e301f4c7e10d4dda69e051b70c165c8fb1ad695ed97dd89d9f6314
                                          • Instruction Fuzzy Hash: 21516F30A44A0CBEEF749F24CC46BF93BA5BB46322F148211F71596AE1D775A980FB41
                                          APIs
                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 000B6890
                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 000B68A9
                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 000B68B9
                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 000B68D1
                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 000B68F2
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00078874,00000000,00000000,00000000,000000FF,00000000), ref: 000B6901
                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 000B691E
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00078874,00000000,00000000,00000000,000000FF,00000000), ref: 000B692D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                          • String ID:
                                          • API String ID: 1268354404-0
                                          • Opcode ID: edff9fb1b806dcbd48aae1c384061ab0365b18b08597674f6b7310b6c3d43ee2
                                          • Instruction ID: b165e86b027da736bcbdbd4e34f434e533cfa79f54e1bf5c77fa3d1824f69288
                                          • Opcode Fuzzy Hash: edff9fb1b806dcbd48aae1c384061ab0365b18b08597674f6b7310b6c3d43ee2
                                          • Instruction Fuzzy Hash: A7519E70A00209EFEB20CF25CC56FAA77F5FB58750F108528F90A976A0DB79E990DB54
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 000DC182
                                          • GetLastError.KERNEL32 ref: 000DC195
                                          • SetEvent.KERNEL32(?), ref: 000DC1A9
                                            • Part of subcall function 000DC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 000DC272
                                            • Part of subcall function 000DC253: GetLastError.KERNEL32 ref: 000DC322
                                            • Part of subcall function 000DC253: SetEvent.KERNEL32(?), ref: 000DC336
                                            • Part of subcall function 000DC253: InternetCloseHandle.WININET(00000000), ref: 000DC341
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                          • String ID:
                                          • API String ID: 337547030-0
                                          • Opcode ID: 81893a8725a321198f0a10e8052dc7b8e6023ddb2e854670b79a599d01e4ae6b
                                          • Instruction ID: d0afd9c99ed5c1ee167c6170de5f9ff9652030718fe65aec899ba5938f694f43
                                          • Opcode Fuzzy Hash: 81893a8725a321198f0a10e8052dc7b8e6023ddb2e854670b79a599d01e4ae6b
                                          • Instruction Fuzzy Hash: 7D318771200746AFFB219FA59D44EBABBE8FF58300B10442EF95682B10C734E814EBB0
                                          APIs
                                            • Part of subcall function 000C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 000C3A57
                                            • Part of subcall function 000C3A3D: GetCurrentThreadId.KERNEL32 ref: 000C3A5E
                                            • Part of subcall function 000C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,000C25B3), ref: 000C3A65
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 000C25BD
                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 000C25DB
                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 000C25DF
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 000C25E9
                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 000C2601
                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 000C2605
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 000C260F
                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 000C2623
                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 000C2627
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                          • String ID:
                                          • API String ID: 2014098862-0
                                          • Opcode ID: 02bb191f170a84eb2b6f4e2daf3906520f79ec36da68dd70e9933b25e1461949
                                          • Instruction ID: 128f0a8a8c1117ee11d026120ea2d5a447f9bd89c6e3ff81abb3132a3ba911fa
                                          • Opcode Fuzzy Hash: 02bb191f170a84eb2b6f4e2daf3906520f79ec36da68dd70e9933b25e1461949
                                          • Instruction Fuzzy Hash: 9D01D430394614BBFB2067689C8BFAD3F59EF4EB12F100005F318AE0E1C9F26454DA6A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,000C1449,?,?,00000000), ref: 000C180C
                                          • HeapAlloc.KERNEL32(00000000,?,000C1449,?,?,00000000), ref: 000C1813
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,000C1449,?,?,00000000), ref: 000C1828
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,000C1449,?,?,00000000), ref: 000C1830
                                          • DuplicateHandle.KERNEL32(00000000,?,000C1449,?,?,00000000), ref: 000C1833
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,000C1449,?,?,00000000), ref: 000C1843
                                          • GetCurrentProcess.KERNEL32(000C1449,00000000,?,000C1449,?,?,00000000), ref: 000C184B
                                          • DuplicateHandle.KERNEL32(00000000,?,000C1449,?,?,00000000), ref: 000C184E
                                          • CreateThread.KERNEL32(00000000,00000000,000C1874,00000000,00000000,00000000), ref: 000C1868
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                          • String ID:
                                          • API String ID: 1957940570-0
                                          • Opcode ID: 1e6a0e7e95339cf56a3c99f0e307e0928c99cd03da2a062ada0d83c4c0e28368
                                          • Instruction ID: 76c1bc2ba56e79069575a6b4e8aa348a934c7b0d6613fa237c0c9edb1368051b
                                          • Opcode Fuzzy Hash: 1e6a0e7e95339cf56a3c99f0e307e0928c99cd03da2a062ada0d83c4c0e28368
                                          • Instruction Fuzzy Hash: 9301BF75240308BFF710AB65DD4EF6B3B6CFB8AB11F004411FA05DB591CA749814DB60
                                          APIs
                                            • Part of subcall function 000CD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 000CD501
                                            • Part of subcall function 000CD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 000CD50F
                                            • Part of subcall function 000CD4DC: CloseHandle.KERNEL32(00000000), ref: 000CD5DC
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 000EA16D
                                          • GetLastError.KERNEL32 ref: 000EA180
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 000EA1B3
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 000EA268
                                          • GetLastError.KERNEL32(00000000), ref: 000EA273
                                          • CloseHandle.KERNEL32(00000000), ref: 000EA2C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                          • String ID: SeDebugPrivilege
                                          • API String ID: 2533919879-2896544425
                                          • Opcode ID: 687319be0b0ae0758fbefa4120c623caa8018ac8861f20776ffaa4319ad02a88
                                          • Instruction ID: 326c41b075802b17bbb71217ce41a463ce3c509777426151852bcc2d42697e65
                                          • Opcode Fuzzy Hash: 687319be0b0ae0758fbefa4120c623caa8018ac8861f20776ffaa4319ad02a88
                                          • Instruction Fuzzy Hash: 5961B3302042819FE720DF19C494F69BBE1AF49318F14849CE5669BBA3C776FD45CB92
                                          APIs
                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 000F3925
                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 000F393A
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 000F3954
                                          • _wcslen.LIBCMT ref: 000F3999
                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 000F39C6
                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 000F39F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window_wcslen
                                          • String ID: SysListView32
                                          • API String ID: 2147712094-78025650
                                          • Opcode ID: 60a15a3ad3425bf3a7dbd7fca1a1a3c8cedac37b843acd64cd01b2a851b06b87
                                          • Instruction ID: 6d5f540cc8c78d114ee5dde2bf4089d2cf5035820b470eae4ea0c38afbc78d38
                                          • Opcode Fuzzy Hash: 60a15a3ad3425bf3a7dbd7fca1a1a3c8cedac37b843acd64cd01b2a851b06b87
                                          • Instruction Fuzzy Hash: 22419171A0431DABEB219F64CC45FFA77A9EF08360F100526FA58E7681D7B59980DB90
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 000CBCFD
                                          • IsMenu.USER32(00000000), ref: 000CBD1D
                                          • CreatePopupMenu.USER32 ref: 000CBD53
                                          • GetMenuItemCount.USER32(00BD46E8), ref: 000CBDA4
                                          • InsertMenuItemW.USER32(00BD46E8,?,00000001,00000030), ref: 000CBDCC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                          • String ID: 0$2
                                          • API String ID: 93392585-3793063076
                                          • Opcode ID: 3526c8a78bdb911d8af74a28913069108a463fe8ebd78911d19d2b37648540b4
                                          • Instruction ID: 09e73ad90dc644931f8b150bdd97323a3cc1c305e5034beeac02f1ff51382eef
                                          • Opcode Fuzzy Hash: 3526c8a78bdb911d8af74a28913069108a463fe8ebd78911d19d2b37648540b4
                                          • Instruction Fuzzy Hash: D551AD70A002099BEB20DFA8D986FAEBBF8BF45314F14415DE403AB291E7709945CB61
                                          APIs
                                          • LoadIconW.USER32(00000000,00007F03), ref: 000CC913
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: IconLoad
                                          • String ID: blank$info$question$stop$warning
                                          • API String ID: 2457776203-404129466
                                          • Opcode ID: f453c1d8da6e451a5bb42858eb4ac87eea8637758698575042731881b462b398
                                          • Instruction ID: e9075b018c98722f342678c93caebb63c076c6217e7bf0088334cd6f8dd873dd
                                          • Opcode Fuzzy Hash: f453c1d8da6e451a5bb42858eb4ac87eea8637758698575042731881b462b398
                                          • Instruction Fuzzy Hash: DF11D831689317BAF715AB54EC83EAE77ECDF15354B10002EF508A61C2E7B49D005365
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                          • String ID: 0.0.0.0
                                          • API String ID: 642191829-3771769585
                                          • Opcode ID: 6cf746a5339a719c5b84146c190eda9128953febc2c5fdee8d2a8cf482d75a56
                                          • Instruction ID: ece1bb6fd445cc75eb34ca900adf210df9cc2d1a0cb3a5028020a584bd347ff3
                                          • Opcode Fuzzy Hash: 6cf746a5339a719c5b84146c190eda9128953febc2c5fdee8d2a8cf482d75a56
                                          • Instruction Fuzzy Hash: 40110A31904219ABEB307B60DC0AEEF77ACEF15710F01017EF54596092EF748A81DB50
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 000BD3AD
                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 000BD3BF
                                          • FreeLibrary.KERNEL32(00000000), ref: 000BD3E5
                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 000BD3FC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                          • String ID: GetSystemWow64DirectoryW$X64$kernel32.dll
                                          • API String ID: 582185067-2904798639
                                          • Opcode ID: 30caa3151f93f63e5f1eb40bff59d70236e7117ac6da25d1913328f2798b59e2
                                          • Instruction ID: bc0a877df13bdc34b7eba30e4ee42ba0ad8b35e55db3f3aad868adec327a3932
                                          • Opcode Fuzzy Hash: 30caa3151f93f63e5f1eb40bff59d70236e7117ac6da25d1913328f2798b59e2
                                          • Instruction Fuzzy Hash: 37F0E23090626A9BE7B197108C6AEFDB3B4BF11B01F448056F506F6485EB38CE04EA91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$LocalTime
                                          • String ID:
                                          • API String ID: 952045576-0
                                          • Opcode ID: e6371d1536a0d33f5cafa55a46e8796a52c5eca4068aae29a77ab67bea31efed
                                          • Instruction ID: 00b23b219f6b92b5c790a3965da5f739f7943b5287b0a525c2b135ca3dc2fbe6
                                          • Opcode Fuzzy Hash: e6371d1536a0d33f5cafa55a46e8796a52c5eca4068aae29a77ab67bea31efed
                                          • Instruction Fuzzy Hash: 0241AE65C1021876CB21FBB4C88AACFB7A8BF45310F518567E558E3163FB34E245C3A6
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,000B682C,00000004,00000000,00000000), ref: 0007F953
                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,000B682C,00000004,00000000,00000000), ref: 000BF3D1
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,000B682C,00000004,00000000,00000000), ref: 000BF454
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ShowWindow
                                          • String ID:
                                          • API String ID: 1268545403-0
                                          • Opcode ID: 8beb0ec998f0f324a9e4c6f781aadc856fa896f9345cb3249221d17cb1befd35
                                          • Instruction ID: b67242572c9e913c7055813a985d78ca34acbce10d0ef9b618141bcab77c97cb
                                          • Opcode Fuzzy Hash: 8beb0ec998f0f324a9e4c6f781aadc856fa896f9345cb3249221d17cb1befd35
                                          • Instruction Fuzzy Hash: 4C413B31A08782BAD7749B2DCD88BBA7BD1AB46314F14C03CE24F97961D73DA880DB15
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 000F2D1B
                                          • GetDC.USER32(00000000), ref: 000F2D23
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 000F2D2E
                                          • ReleaseDC.USER32(00000000,00000000), ref: 000F2D3A
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 000F2D76
                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 000F2D87
                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,000F5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 000F2DC2
                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 000F2DE1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                          • String ID:
                                          • API String ID: 3864802216-0
                                          • Opcode ID: b48e38698d4c889d3db7d90ce746633e8824a06cc99f31d2cf72deed20215822
                                          • Instruction ID: bb9c701ff679e24327cf50dffe508709624f66b0a8d9c894201849ec1a5caa97
                                          • Opcode Fuzzy Hash: b48e38698d4c889d3db7d90ce746633e8824a06cc99f31d2cf72deed20215822
                                          • Instruction Fuzzy Hash: 1F318972201618BBFB218F50CC8AFFB3BA9EF09711F044055FE08DA691C6799C51DBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: 6af4736030a158defcaa53f32d1fe17e9cf703f2979664c4a99ccab5bb434f6a
                                          • Instruction ID: f73cc7be015d95434fa8950ce827164efe902ab3ecec7ff6d2c4df9cc6b5b6b0
                                          • Opcode Fuzzy Hash: 6af4736030a158defcaa53f32d1fe17e9cf703f2979664c4a99ccab5bb434f6a
                                          • Instruction Fuzzy Hash: 6921C87564091977961467109E82FFE279CAF51386B440028FE045B982F760FE9192E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NULL Pointer assignment$Not an Object type
                                          • API String ID: 0-572801152
                                          • Opcode ID: e6b9fbf5edd035cf1155ab371a1ffecd85d2da9217afd2f402952e77397c2300
                                          • Instruction ID: 54933f895f0ec7daab6c3eae8e251f3f827a479321c9064d4b07c409e54baab2
                                          • Opcode Fuzzy Hash: e6b9fbf5edd035cf1155ab371a1ffecd85d2da9217afd2f402952e77397c2300
                                          • Instruction Fuzzy Hash: 6BD1B071A0064A9FDF14CFA9CC81BAEB7F5BF48348F148869E915AB281E770DD41CB90
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,000A17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 000A15CE
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,000A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 000A1651
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,000A17FB,?,000A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 000A16E4
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,000A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 000A16FB
                                            • Part of subcall function 00093820: RtlAllocateHeap.NTDLL(00000000,?,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6,?,00061129), ref: 00093852
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,000A17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 000A1777
                                          • __freea.LIBCMT ref: 000A17A2
                                          • __freea.LIBCMT ref: 000A17AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                          • String ID:
                                          • API String ID: 2829977744-0
                                          • Opcode ID: f3decf5d0ddeac115bc80596d3ea9901ddb5d9ad15c87a00158f4a515ae5100f
                                          • Instruction ID: b32e8208960b75c82d9b759bbe7982b6fe8a4f487db6e54045fa4d17aae75ec2
                                          • Opcode Fuzzy Hash: f3decf5d0ddeac115bc80596d3ea9901ddb5d9ad15c87a00158f4a515ae5100f
                                          • Instruction Fuzzy Hash: B191D471E046169ADF249EF4CC81EEE7BF5AF4A350F184669E812E7181EB35DD40CBA0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                          • API String ID: 2610073882-625585964
                                          • Opcode ID: b6e01956c476d67300509b75d466c9a24af285e21f5d36fb384bbb125f1da6c4
                                          • Instruction ID: cb8676c66d283ab4557208ac1fda00c06a81965c10dbc5ad5460e058ff4b186a
                                          • Opcode Fuzzy Hash: b6e01956c476d67300509b75d466c9a24af285e21f5d36fb384bbb125f1da6c4
                                          • Instruction Fuzzy Hash: 88919171A04259AFDF20CFA6D884FAEBBB8EF86710F108559F545BB281D7709941CFA0
                                          APIs
                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 000D125C
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 000D1284
                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 000D12A8
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 000D12D8
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 000D135F
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 000D13C4
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 000D1430
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                          • String ID:
                                          • API String ID: 2550207440-0
                                          • Opcode ID: 3461052dcd49f250d2c3fcfc760cf760fc02b84ef7fc0ae09d9a9085c028773a
                                          • Instruction ID: 3b00364bc861af0cce5fd3ca0d87d86b17b16d35efa633dbfb7a7342dfad6a25
                                          • Opcode Fuzzy Hash: 3461052dcd49f250d2c3fcfc760cf760fc02b84ef7fc0ae09d9a9085c028773a
                                          • Instruction Fuzzy Hash: 0391BF75A00309AFEB109F98C885BFE77B5FF45315F14402AE940E7392DB79A941CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: 053fd052c4c73b2ae9dbb2fade18b0c8910e4bff198070400431f232e83fddf2
                                          • Instruction ID: f26430baad7efe5f8c47ed458cce450babcca2afe669ea27467eac55d9a28e26
                                          • Opcode Fuzzy Hash: 053fd052c4c73b2ae9dbb2fade18b0c8910e4bff198070400431f232e83fddf2
                                          • Instruction Fuzzy Hash: FF913A71D00219EFCB50CFA9CC84AEEBBB8FF89320F148555E519B7251D778AA42CB64
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 000E396B
                                          • CharUpperBuffW.USER32(?,?), ref: 000E3A7A
                                          • _wcslen.LIBCMT ref: 000E3A8A
                                          • VariantClear.OLEAUT32(?), ref: 000E3C1F
                                            • Part of subcall function 000D0CDF: VariantInit.OLEAUT32(00000000), ref: 000D0D1F
                                            • Part of subcall function 000D0CDF: VariantCopy.OLEAUT32(?,?), ref: 000D0D28
                                            • Part of subcall function 000D0CDF: VariantClear.OLEAUT32(?), ref: 000D0D34
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                          • API String ID: 4137639002-1221869570
                                          • Opcode ID: 478ade5b82f11134afe43e0d0f405efd1efb539945b9b5f0dbe5edd313a945f9
                                          • Instruction ID: f7d1c5acd85a86b57cd5dc7687feee0b6002de5240a18f55b552440d454257ea
                                          • Opcode Fuzzy Hash: 478ade5b82f11134afe43e0d0f405efd1efb539945b9b5f0dbe5edd313a945f9
                                          • Instruction Fuzzy Hash: 959199746083419FC710DF25C48596ABBE5FF89314F14886EF88AAB352DB30EE45CB82
                                          APIs
                                            • Part of subcall function 000C000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?,?,000C035E), ref: 000C002B
                                            • Part of subcall function 000C000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?), ref: 000C0046
                                            • Part of subcall function 000C000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?), ref: 000C0054
                                            • Part of subcall function 000C000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?), ref: 000C0064
                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 000E4C51
                                          • _wcslen.LIBCMT ref: 000E4D59
                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 000E4DCF
                                          • CoTaskMemFree.OLE32(?), ref: 000E4DDA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                          • String ID: NULL Pointer assignment
                                          • API String ID: 614568839-2785691316
                                          • Opcode ID: 63db3e3af52cf3e98a5c399f709661a645066cb5b23f7d3c36c7208b0222931a
                                          • Instruction ID: 2656ed5b1807cf1cedf63579eb9f8ff72bdb815acfa0323be7c5c034293e0ef8
                                          • Opcode Fuzzy Hash: 63db3e3af52cf3e98a5c399f709661a645066cb5b23f7d3c36c7208b0222931a
                                          • Instruction Fuzzy Hash: F0911471D0025DAFDF14DFA5C891AEEB7B9BF08310F10816AE915B7292EB709A44CF60
                                          APIs
                                          • GetMenu.USER32(?), ref: 000F2183
                                          • GetMenuItemCount.USER32(00000000), ref: 000F21B5
                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 000F21DD
                                          • _wcslen.LIBCMT ref: 000F2213
                                          • GetMenuItemID.USER32(?,?), ref: 000F224D
                                          • GetSubMenu.USER32(?,?), ref: 000F225B
                                            • Part of subcall function 000C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 000C3A57
                                            • Part of subcall function 000C3A3D: GetCurrentThreadId.KERNEL32 ref: 000C3A5E
                                            • Part of subcall function 000C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,000C25B3), ref: 000C3A65
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 000F22E3
                                            • Part of subcall function 000CE97B: Sleep.KERNEL32 ref: 000CE9F3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                          • String ID:
                                          • API String ID: 4196846111-0
                                          • Opcode ID: 59dafe5784f95128efafac80ef44300c09cde189c21d4bf9537d003ef5d20a70
                                          • Instruction ID: 617d9e8ae037ca6870b69dd9cc96c3e13b9ec5d61cd1e4f088f3b207425c67be
                                          • Opcode Fuzzy Hash: 59dafe5784f95128efafac80ef44300c09cde189c21d4bf9537d003ef5d20a70
                                          • Instruction Fuzzy Hash: 65717D75A00209AFDB50DFA4C841ABEB7F1FF88310F148469E956EB752DB34AE41DB90
                                          APIs
                                          • GetParent.USER32(?), ref: 000CAEF9
                                          • GetKeyboardState.USER32(?), ref: 000CAF0E
                                          • SetKeyboardState.USER32(?), ref: 000CAF6F
                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 000CAF9D
                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 000CAFBC
                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 000CAFFD
                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 000CB020
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: adb2246e7acb0ba6ef7f3e8ec1f2b2dad9122eebf3c292130ca8bacbe7215fbd
                                          • Instruction ID: 9895525f88a06afe6bf614189fec8a9bb781e9b1a5bfb960e7a57a07a8c5d7a5
                                          • Opcode Fuzzy Hash: adb2246e7acb0ba6ef7f3e8ec1f2b2dad9122eebf3c292130ca8bacbe7215fbd
                                          • Instruction Fuzzy Hash: 2251C1A0A047D93DFB3643748C46FBE7EE95B06308F08848DE1D9858D3C3A8AC85D752
                                          APIs
                                          • GetParent.USER32(00000000), ref: 000CAD19
                                          • GetKeyboardState.USER32(?), ref: 000CAD2E
                                          • SetKeyboardState.USER32(?), ref: 000CAD8F
                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 000CADBB
                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 000CADD8
                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 000CAE17
                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 000CAE38
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 79a715b89744106ca88965184ef3cf1cf3391222588b96004acf044648a2f9e9
                                          • Instruction ID: 56f398dd58d7ff33b6661d12c866fa701a37b839764596a28a72324de0c2dcda
                                          • Opcode Fuzzy Hash: 79a715b89744106ca88965184ef3cf1cf3391222588b96004acf044648a2f9e9
                                          • Instruction Fuzzy Hash: 3751A3A16447D93DFB3683248C55FBE7EE95B46308F08858DE1D6868C3D294AC84E7A2
                                          APIs
                                          • GetConsoleCP.KERNEL32(000A3CD6,?,?,?,?,?,?,?,?,00095BA3,?,?,000A3CD6,?,?), ref: 00095470
                                          • __fassign.LIBCMT ref: 000954EB
                                          • __fassign.LIBCMT ref: 00095506
                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,000A3CD6,00000005,00000000,00000000), ref: 0009552C
                                          • WriteFile.KERNEL32(?,000A3CD6,00000000,00095BA3,00000000,?,?,?,?,?,?,?,?,?,00095BA3,?), ref: 0009554B
                                          • WriteFile.KERNEL32(?,?,00000001,00095BA3,00000000,?,?,?,?,?,?,?,?,?,00095BA3,?), ref: 00095584
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: 37870b584d1e337984b1ba7cbe0f240d325e5bec892f33d38c17f11e3d3a4f3d
                                          • Instruction ID: 28d51ca54d3a8f9c0304d4d33d32fe8ec679cacdfc2adfa327cc2699fde2b424
                                          • Opcode Fuzzy Hash: 37870b584d1e337984b1ba7cbe0f240d325e5bec892f33d38c17f11e3d3a4f3d
                                          • Instruction Fuzzy Hash: 9B51C170A007099FDF11CFA8DC55AEEBBF9EF09301F15411AF995E7292D6309A41DB60
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00082D4B
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00082D53
                                          • _ValidateLocalCookies.LIBCMT ref: 00082DE1
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00082E0C
                                          • _ValidateLocalCookies.LIBCMT ref: 00082E61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 161ab8bd3e6f3ff910c5aa4e5963b324900e3eb18bbf3c6022a4954795439139
                                          • Instruction ID: 07344dc15064cc3b6a2385d368c0ed5bab03c38aa5a0d56b7d5ab96520a7adb4
                                          • Opcode Fuzzy Hash: 161ab8bd3e6f3ff910c5aa4e5963b324900e3eb18bbf3c6022a4954795439139
                                          • Instruction Fuzzy Hash: 61418034A00319ABCF10EF68C845AEEBFF5BF84324F148155E9956B392DB71AA15CBD0
                                          APIs
                                            • Part of subcall function 000E304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 000E307A
                                            • Part of subcall function 000E304E: _wcslen.LIBCMT ref: 000E309B
                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 000E1112
                                          • WSAGetLastError.WSOCK32 ref: 000E1121
                                          • WSAGetLastError.WSOCK32 ref: 000E11C9
                                          • closesocket.WSOCK32(00000000), ref: 000E11F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 2675159561-0
                                          • Opcode ID: 8bfa4c59a3b8f0c96e154190c69190e3b452978a00b8913a8a562c545d3c22a2
                                          • Instruction ID: ef5e8a9964eee13331b0a20f92c89cc25502731311104f06c04c674640ed1225
                                          • Opcode Fuzzy Hash: 8bfa4c59a3b8f0c96e154190c69190e3b452978a00b8913a8a562c545d3c22a2
                                          • Instruction Fuzzy Hash: 8741F631600248AFEB109F55C845FEDBBE9EF45364F148099FD15AB292C774AD41CBE0
                                          APIs
                                            • Part of subcall function 000CDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,000CCF22,?), ref: 000CDDFD
                                            • Part of subcall function 000CDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,000CCF22,?), ref: 000CDE16
                                          • lstrcmpiW.KERNEL32(?,?), ref: 000CCF45
                                          • MoveFileW.KERNEL32(?,?), ref: 000CCF7F
                                          • _wcslen.LIBCMT ref: 000CD005
                                          • _wcslen.LIBCMT ref: 000CD01B
                                          • SHFileOperationW.SHELL32(?), ref: 000CD061
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 3164238972-1173974218
                                          • Opcode ID: 030ef2e756bbf8fc04456df32c501be3a079d006349a1a581c1913eba05272c0
                                          • Instruction ID: 09abc57f0c499b5395d5affad0aab9c9465891b87654bbf4f730310ac4236f46
                                          • Opcode Fuzzy Hash: 030ef2e756bbf8fc04456df32c501be3a079d006349a1a581c1913eba05272c0
                                          • Instruction Fuzzy Hash: 394155719052185FEF52EBA4C981FDDB7F9AF18380F1000FEE549EB142EA34A645DB50
                                          APIs
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 000F2E1C
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000F2E4F
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000F2E84
                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 000F2EB6
                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 000F2EE0
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 000F2EF1
                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 000F2F0B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LongWindow$MessageSend
                                          • String ID:
                                          • API String ID: 2178440468-0
                                          • Opcode ID: 8cc2eca06d7cc02a65baf8163ab7b97578198c46b4c934750e030d2524af7340
                                          • Instruction ID: ce13a7e6454489676bbb6fd1fbc0848cf7975661958a72664221dca6e8700015
                                          • Opcode Fuzzy Hash: 8cc2eca06d7cc02a65baf8163ab7b97578198c46b4c934750e030d2524af7340
                                          • Instruction Fuzzy Hash: 5731F230644258EFEB21CF58DD85FA537E5EB9A714F250164FA00CFAB2CB71A884EB41
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 000C7769
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 000C778F
                                          • SysAllocString.OLEAUT32(00000000), ref: 000C7792
                                          • SysAllocString.OLEAUT32(?), ref: 000C77B0
                                          • SysFreeString.OLEAUT32(?), ref: 000C77B9
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 000C77DE
                                          • SysAllocString.OLEAUT32(?), ref: 000C77EC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: 5c33aaea12e7b101b3c3b6e6a4d70f3075ed6fa3d3fbd80158ab23a29257bd75
                                          • Instruction ID: 029338824832ec507194fa1c5b0e52f9a8143e968b74568654060c202c57b755
                                          • Opcode Fuzzy Hash: 5c33aaea12e7b101b3c3b6e6a4d70f3075ed6fa3d3fbd80158ab23a29257bd75
                                          • Instruction Fuzzy Hash: E2219F7660821DAFEB10DFA8CC89EBE73ECEB093647008129F918DB151D674AC45DB64
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 000C7842
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 000C7868
                                          • SysAllocString.OLEAUT32(00000000), ref: 000C786B
                                          • SysAllocString.OLEAUT32 ref: 000C788C
                                          • SysFreeString.OLEAUT32 ref: 000C7895
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 000C78AF
                                          • SysAllocString.OLEAUT32(?), ref: 000C78BD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: c70899d2efe4cf1d64bce00913f82a4972e0f25eb2a888d0db426d2a2e656cb6
                                          • Instruction ID: f9bc6802b59d89014c2ad53c53bf3383477c649c66134e3d5a1febf9b5702696
                                          • Opcode Fuzzy Hash: c70899d2efe4cf1d64bce00913f82a4972e0f25eb2a888d0db426d2a2e656cb6
                                          • Instruction Fuzzy Hash: BA214735604109AFEB109FA8DC89EBE77ECEB097607108129FA19CB1A1DA74DC45DB74
                                          APIs
                                          • GetStdHandle.KERNEL32(0000000C), ref: 000D04F2
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 000D052E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: 6f7fa8e8d60ea8fe373491dbd1496c416c79500d9b35a3e695fe0b71dc47d532
                                          • Instruction ID: d91b7bf40e79d725218d6b12f4fe9f2478040270d9300d49344ff9b953a0e60c
                                          • Opcode Fuzzy Hash: 6f7fa8e8d60ea8fe373491dbd1496c416c79500d9b35a3e695fe0b71dc47d532
                                          • Instruction Fuzzy Hash: 57217E75900705EBEB208F29EC05BAA77E4AF44764F204A1AECA5D72E4D7709950DF30
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 000D05C6
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 000D0601
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: cbaa5f2447b46ddadb1b65d9e8a3b52eaad706c813b0826d3390ce50a99091ee
                                          • Instruction ID: 540e1a968e709220827f082d0bec9a5a433b0c708394faf17a24039230e61f9d
                                          • Opcode Fuzzy Hash: cbaa5f2447b46ddadb1b65d9e8a3b52eaad706c813b0826d3390ce50a99091ee
                                          • Instruction Fuzzy Hash: F5219F755003059BEB208F799C05FAA77E8AF85724F200A1AF8A5E33E0D770D960DB30
                                          APIs
                                            • Part of subcall function 0006600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0006604C
                                            • Part of subcall function 0006600E: GetStockObject.GDI32(00000011), ref: 00066060
                                            • Part of subcall function 0006600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0006606A
                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 000F4112
                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 000F411F
                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 000F412A
                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 000F4139
                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 000F4145
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$CreateObjectStockWindow
                                          • String ID: Msctls_Progress32
                                          • API String ID: 1025951953-3636473452
                                          • Opcode ID: 586d78df47b0f862d1b562b40a07de3b8b943fddc58d1153b8845ada9d193131
                                          • Instruction ID: 2f8a98fd32757064f8e721a42a3786a631870df048f57943459d26f82cd7f4e1
                                          • Opcode Fuzzy Hash: 586d78df47b0f862d1b562b40a07de3b8b943fddc58d1153b8845ada9d193131
                                          • Instruction Fuzzy Hash: 79115EB215021DBEEB219E64CC86EE77F9DEF08798F014111BB18A6190CB769C61DBA4
                                          APIs
                                            • Part of subcall function 0009D7A3: _free.LIBCMT ref: 0009D7CC
                                          • _free.LIBCMT ref: 0009D82D
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 0009D838
                                          • _free.LIBCMT ref: 0009D843
                                          • _free.LIBCMT ref: 0009D897
                                          • _free.LIBCMT ref: 0009D8A2
                                          • _free.LIBCMT ref: 0009D8AD
                                          • _free.LIBCMT ref: 0009D8B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                          • Instruction ID: 6414fa889f79b1c35c057c22dc61fb2e7f1f718e586a86b7bb9d546d07d27c75
                                          • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                          • Instruction Fuzzy Hash: FA11DA71585B04BADE21FFF0CC47FCBBBDCAF05700F404826B29DA6593EA65B505A6A0
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 000CDA74
                                          • LoadStringW.USER32(00000000), ref: 000CDA7B
                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 000CDA91
                                          • LoadStringW.USER32(00000000), ref: 000CDA98
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 000CDADC
                                          Strings
                                          • %s (%d) : ==> %s: %s %s, xrefs: 000CDAB9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message
                                          • String ID: %s (%d) : ==> %s: %s %s
                                          • API String ID: 4072794657-3128320259
                                          • Opcode ID: f7e45851d44b0cb55db124eee6c4c2b8c372b90f1fcde060df01d2d701e44c05
                                          • Instruction ID: 5110c3f0c7f217553cfd3d134c203e6d947d80a14219e6c97d33e740e3f7c3a9
                                          • Opcode Fuzzy Hash: f7e45851d44b0cb55db124eee6c4c2b8c372b90f1fcde060df01d2d701e44c05
                                          • Instruction Fuzzy Hash: D30162F250420C7FF710ABA09E8AEFB736CE708701F4004A6B746E2441E6789E849F75
                                          APIs
                                          • InterlockedExchange.KERNEL32(00BCDEB0,00BCDEB0), ref: 000D097B
                                          • EnterCriticalSection.KERNEL32(00BCDE90,00000000), ref: 000D098D
                                          • TerminateThread.KERNEL32(00000000,000001F6), ref: 000D099B
                                          • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 000D09A9
                                          • CloseHandle.KERNEL32(00000000), ref: 000D09B8
                                          • InterlockedExchange.KERNEL32(00BCDEB0,000001F6), ref: 000D09C8
                                          • LeaveCriticalSection.KERNEL32(00BCDE90), ref: 000D09CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 3495660284-0
                                          • Opcode ID: 09d390f78b899b98fb64b022d90668c628d762fb92bc4d2a7a55dd5024b50ea8
                                          • Instruction ID: a5c7e6e353acd9ef5046fb52d61c35ce8bb47edb6a5a6d02cbec314b9857b4dc
                                          • Opcode Fuzzy Hash: 09d390f78b899b98fb64b022d90668c628d762fb92bc4d2a7a55dd5024b50ea8
                                          • Instruction Fuzzy Hash: A2F01D31442606BBF7815B94EF8AFE6BA25FF01702F401016F10190CA0C7789465EFA0
                                          APIs
                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 000E1DC0
                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 000E1DE1
                                          • WSAGetLastError.WSOCK32 ref: 000E1DF2
                                          • htons.WSOCK32(?,?,?,?,?), ref: 000E1EDB
                                          • inet_ntoa.WSOCK32(?), ref: 000E1E8C
                                            • Part of subcall function 000C39E8: _strlen.LIBCMT ref: 000C39F2
                                            • Part of subcall function 000E3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,000DEC0C), ref: 000E3240
                                          • _strlen.LIBCMT ref: 000E1F35
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                          • String ID:
                                          • API String ID: 3203458085-0
                                          • Opcode ID: 8128899778d2d23aaa5901980386ee1ad2d44dd8d2ef9584b1dc548be7b8c9ce
                                          • Instruction ID: 0e3db3d262b1b854fb9d4b90052081d806cf0e55ab1955cd96d7ffac0b1930d7
                                          • Opcode Fuzzy Hash: 8128899778d2d23aaa5901980386ee1ad2d44dd8d2ef9584b1dc548be7b8c9ce
                                          • Instruction Fuzzy Hash: 25B1D070604380AFD324DF25C885FAA7BE5AF84318F54855CF45AAB2A3DB31ED42CB91
                                          APIs
                                          • GetClientRect.USER32(?,?), ref: 00065D30
                                          • GetWindowRect.USER32(?,?), ref: 00065D71
                                          • ScreenToClient.USER32(?,?), ref: 00065D99
                                          • GetClientRect.USER32(?,?), ref: 00065ED7
                                          • GetWindowRect.USER32(?,?), ref: 00065EF8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Rect$Client$Window$Screen
                                          • String ID:
                                          • API String ID: 1296646539-0
                                          • Opcode ID: fb6d9889591d960475f6dea4acb56b805b359489ba096895fda417d49d9d10a2
                                          • Instruction ID: aa03f9982a65679006b1db6da2c25d474d1c1081c5d4d38c9cc8e0faf5bd0eba
                                          • Opcode Fuzzy Hash: fb6d9889591d960475f6dea4acb56b805b359489ba096895fda417d49d9d10a2
                                          • Instruction Fuzzy Hash: 65B17C38A0074ADBDB24CFA8C8407EEB7F2FF58311F14851AE8A9D7250DB74AA51DB50
                                          APIs
                                          • __allrem.LIBCMT ref: 000900BA
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000900D6
                                          • __allrem.LIBCMT ref: 000900ED
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0009010B
                                          • __allrem.LIBCMT ref: 00090122
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00090140
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                          • Instruction ID: f394accbabf24b9944da4e7cc5d012b1c80cb0e1f290c7950c005efa3c165fb0
                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                          • Instruction Fuzzy Hash: AC81F672A00706AFEB24AF78CC41BAFB3E9AF41764F24453AF551D7282E771D9009B90
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,000882D9,000882D9,?,?,?,0009644F,00000001,00000001,8BE85006), ref: 00096258
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0009644F,00000001,00000001,8BE85006,?,?,?), ref: 000962DE
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 000963D8
                                          • __freea.LIBCMT ref: 000963E5
                                            • Part of subcall function 00093820: RtlAllocateHeap.NTDLL(00000000,?,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6,?,00061129), ref: 00093852
                                          • __freea.LIBCMT ref: 000963EE
                                          • __freea.LIBCMT ref: 00096413
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 1414292761-0
                                          • Opcode ID: 4d98f21e3b4518016ddbc239201b7e5635df458e8aec46c9d1d36b95560001c8
                                          • Instruction ID: 3423d912e83134e9d0718f2ba0260681061b253f8ae9be46a5ec02af30c19b99
                                          • Opcode Fuzzy Hash: 4d98f21e3b4518016ddbc239201b7e5635df458e8aec46c9d1d36b95560001c8
                                          • Instruction Fuzzy Hash: AD51F372600216ABEF268F64CC81EBF77A9EF45750F158229FC05D7141EB36DD50E660
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000EB6AE,?,?), ref: 000EC9B5
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000EC9F1
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA68
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000EBCCA
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 000EBD25
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EBD6A
                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 000EBD99
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 000EBDF3
                                          • RegCloseKey.ADVAPI32(?), ref: 000EBDFF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                          • String ID:
                                          • API String ID: 1120388591-0
                                          • Opcode ID: 98aaca01a385070f800b5162a1aa6ea1f1d3ec91c29a78470a3a61bcd770b0ac
                                          • Instruction ID: 05bf31913281dd347cb04233db88b626abb0ed9ab3b5f9706ab581da9132d429
                                          • Opcode Fuzzy Hash: 98aaca01a385070f800b5162a1aa6ea1f1d3ec91c29a78470a3a61bcd770b0ac
                                          • Instruction Fuzzy Hash: A4817C30208281AFD714DF24C895E6BBBE5FF84308F14896CF5599B2A2DB31ED45CB92
                                          APIs
                                          • VariantInit.OLEAUT32(00000035), ref: 000BF7B9
                                          • SysAllocString.OLEAUT32(00000001), ref: 000BF860
                                          • VariantCopy.OLEAUT32(000BFA64,00000000), ref: 000BF889
                                          • VariantClear.OLEAUT32(000BFA64), ref: 000BF8AD
                                          • VariantCopy.OLEAUT32(000BFA64,00000000), ref: 000BF8B1
                                          • VariantClear.OLEAUT32(?), ref: 000BF8BB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCopy$AllocInitString
                                          • String ID:
                                          • API String ID: 3859894641-0
                                          • Opcode ID: b2b17a0d0199fa1aa25fcc7535068449a0316251d2de2357b4110ab1bc3157d7
                                          • Instruction ID: 26ef948697f712e8dfac22128f8817d9aa31d5f6217eb006fa532faea49a5dde
                                          • Opcode Fuzzy Hash: b2b17a0d0199fa1aa25fcc7535068449a0316251d2de2357b4110ab1bc3157d7
                                          • Instruction Fuzzy Hash: 6B51C031600312BADF20AB65DC95BF9B3A9AF45710B209477E906DF292DB749C40CB96
                                          APIs
                                            • Part of subcall function 00067620: _wcslen.LIBCMT ref: 00067625
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 000D94E5
                                          • _wcslen.LIBCMT ref: 000D9506
                                          • _wcslen.LIBCMT ref: 000D952D
                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 000D9585
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$FileName$OpenSave
                                          • String ID: X
                                          • API String ID: 83654149-3081909835
                                          • Opcode ID: 00bc164b261d146f10c33df60c1d6b91ef30627ad7a3241f41cd9ec83be9c2d2
                                          • Instruction ID: e8e007e1ffc2fa2359674e427848f06be0e28eef523d6eb440e7a5c8aa3ffba8
                                          • Opcode Fuzzy Hash: 00bc164b261d146f10c33df60c1d6b91ef30627ad7a3241f41cd9ec83be9c2d2
                                          • Instruction Fuzzy Hash: 71E19371508301DFD724EF24C881AAAB7E5BF85314F14856DF8899B3A2DB31DD45CBA1
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • BeginPaint.USER32(?,?,?), ref: 00079241
                                          • GetWindowRect.USER32(?,?), ref: 000792A5
                                          • ScreenToClient.USER32(?,?), ref: 000792C2
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 000792D3
                                          • EndPaint.USER32(?,?,?,?,?), ref: 00079321
                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 000B71EA
                                            • Part of subcall function 00079339: BeginPath.GDI32(00000000), ref: 00079357
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                          • String ID:
                                          • API String ID: 3050599898-0
                                          • Opcode ID: 432f101dfd7bd03623d40c6a23cf2d0fb0a3ee78fdb91f97c9790bdcdef2683f
                                          • Instruction ID: 83df25c9b8c3e6785e119f67babe5dc28c9c247ed5c0a581beb2409dc9d1eb85
                                          • Opcode Fuzzy Hash: 432f101dfd7bd03623d40c6a23cf2d0fb0a3ee78fdb91f97c9790bdcdef2683f
                                          • Instruction Fuzzy Hash: 2E41C130508300AFE721DF28CC85FBA7BF8EF85324F144669F9A9872A2C7359945DB61
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 000D080C
                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 000D0847
                                          • EnterCriticalSection.KERNEL32(?), ref: 000D0863
                                          • LeaveCriticalSection.KERNEL32(?), ref: 000D08DC
                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 000D08F3
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 000D0921
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3368777196-0
                                          • Opcode ID: a5105e794318ace43211691d4fdb6a1c3ea8847e4893c4a6d97bf9ba445dc5dc
                                          • Instruction ID: 644daa96e2ae1156e3b7e7cd386ce81d966f4c1324d29e427c0930e5cde3f6e3
                                          • Opcode Fuzzy Hash: a5105e794318ace43211691d4fdb6a1c3ea8847e4893c4a6d97bf9ba445dc5dc
                                          • Instruction Fuzzy Hash: 7C416D71900209EFEF14EF54DC85AAAB7B8FF04310F1480A5ED049A297DB74DE65DBA4
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,000BF3AB,00000000,?,?,00000000,?,000B682C,00000004,00000000,00000000), ref: 000F824C
                                          • EnableWindow.USER32(00000000,00000000), ref: 000F8272
                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 000F82D1
                                          • ShowWindow.USER32(00000000,00000004), ref: 000F82E5
                                          • EnableWindow.USER32(00000000,00000001), ref: 000F830B
                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 000F832F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Show$Enable$MessageSend
                                          • String ID:
                                          • API String ID: 642888154-0
                                          • Opcode ID: 1ac1a441b360c103f47b7996852e082c243388796d08841d1e439c808137f68a
                                          • Instruction ID: aaa1fb4eb869bd0a95b87f5a00059860422ef29d712051fa7312e812e7f40409
                                          • Opcode Fuzzy Hash: 1ac1a441b360c103f47b7996852e082c243388796d08841d1e439c808137f68a
                                          • Instruction Fuzzy Hash: 3C419434601648EFEB91CF15C999FF87BE0BB0A714F189169E6084FA72CB31A845EF50
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 000C4C95
                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 000C4CB2
                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 000C4CEA
                                          • _wcslen.LIBCMT ref: 000C4D08
                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 000C4D10
                                          • _wcsstr.LIBVCRUNTIME ref: 000C4D1A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                          • String ID:
                                          • API String ID: 72514467-0
                                          • Opcode ID: b5736283c8d747a75d2930d8d72ee95d0a9740f4f40175a6230e6feab7b56ac3
                                          • Instruction ID: 8798249cb85e544151b24bbb600d4d5a0de5ecebde840efd5f20ddddb15d8600
                                          • Opcode Fuzzy Hash: b5736283c8d747a75d2930d8d72ee95d0a9740f4f40175a6230e6feab7b56ac3
                                          • Instruction Fuzzy Hash: 6A21D7326042057BFB656B299D5AF7F7BE8EF45750F10802DF80ACA1A2EA75DC40D7A0
                                          APIs
                                            • Part of subcall function 00063AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00063A97,?,?,00062E7F,?,?,?,00000000), ref: 00063AC2
                                          • _wcslen.LIBCMT ref: 000D587B
                                          • CoInitialize.OLE32(00000000), ref: 000D5995
                                          • CoCreateInstance.OLE32(000FFCF8,00000000,00000001,000FFB68,?), ref: 000D59AE
                                          • CoUninitialize.OLE32 ref: 000D59CC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 3172280962-24824748
                                          • Opcode ID: c2f4204565f4eeb5745055de115b2d0001caaf0436245f177e566eb91039f4df
                                          • Instruction ID: 2e3b06ec7b11d7863b47ba068ed42a2ff9ee8c885b2adf1450ed0f06f73c7867
                                          • Opcode Fuzzy Hash: c2f4204565f4eeb5745055de115b2d0001caaf0436245f177e566eb91039f4df
                                          • Instruction Fuzzy Hash: 43D156716047019FC714DF14C890A6ABBE6FF89725F14485EF88A9B362DB31EC45CBA2
                                          APIs
                                            • Part of subcall function 000C0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 000C0FCA
                                            • Part of subcall function 000C0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 000C0FD6
                                            • Part of subcall function 000C0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 000C0FE5
                                            • Part of subcall function 000C0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 000C0FEC
                                            • Part of subcall function 000C0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 000C1002
                                          • GetLengthSid.ADVAPI32(?,00000000,000C1335), ref: 000C17AE
                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 000C17BA
                                          • HeapAlloc.KERNEL32(00000000), ref: 000C17C1
                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 000C17DA
                                          • GetProcessHeap.KERNEL32(00000000,00000000,000C1335), ref: 000C17EE
                                          • HeapFree.KERNEL32(00000000), ref: 000C17F5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                          • String ID:
                                          • API String ID: 3008561057-0
                                          • Opcode ID: baafbc376b06e924db1452a68d9a96336cfb5999dd4cceda98478b4b94d1a269
                                          • Instruction ID: b5ae38d6e6f4f8c3afd8ad64146be7cc724692621cac3808f5d08db043a1fae1
                                          • Opcode Fuzzy Hash: baafbc376b06e924db1452a68d9a96336cfb5999dd4cceda98478b4b94d1a269
                                          • Instruction Fuzzy Hash: 0C118931504209EFEB109BA4CD4AFEE7BB9EF42355F10425CE48197212C739A955DB60
                                          APIs
                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 000C14FF
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 000C1506
                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 000C1515
                                          • CloseHandle.KERNEL32(00000004), ref: 000C1520
                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 000C154F
                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 000C1563
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                          • String ID:
                                          • API String ID: 1413079979-0
                                          • Opcode ID: 36fb1d73685fb36fe729cf2690b4e6929d94f91a4814168d1cfc621b1b4c919d
                                          • Instruction ID: 35feb0e49dd60c2fe14103654a248e94efa9fff27e8419ad8f93134c8f7d4145
                                          • Opcode Fuzzy Hash: 36fb1d73685fb36fe729cf2690b4e6929d94f91a4814168d1cfc621b1b4c919d
                                          • Instruction Fuzzy Hash: 3D11297250020DEBEF118F98DE4AFEE7BA9FF49744F044059FA05A2161C3758E65EB60
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00083379,00082FE5), ref: 00083390
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0008339E
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000833B7
                                          • SetLastError.KERNEL32(00000000,?,00083379,00082FE5), ref: 00083409
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 005cd533f8fabe4c581fa50850e7e3bb0e158d90fe533683ef55a67c25ee61ca
                                          • Instruction ID: 14659d9c549c4f0a3d69735d67a0372a977f08ad3ccd181f7e32d23489a98f5e
                                          • Opcode Fuzzy Hash: 005cd533f8fabe4c581fa50850e7e3bb0e158d90fe533683ef55a67c25ee61ca
                                          • Instruction Fuzzy Hash: 1F012832608711BEA67437787C859AA2AD4FB85B793204229F650801F2EF114F2253C8
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00095686,000A3CD6,?,00000000,?,00095B6A,?,?,?,?,?,0008E6D1,?,00128A48), ref: 00092D78
                                          • _free.LIBCMT ref: 00092DAB
                                          • _free.LIBCMT ref: 00092DD3
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0008E6D1,?,00128A48,00000010,00064F4A,?,?,00000000,000A3CD6), ref: 00092DE0
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0008E6D1,?,00128A48,00000010,00064F4A,?,?,00000000,000A3CD6), ref: 00092DEC
                                          • _abort.LIBCMT ref: 00092DF2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: 37ec343f62c50c9c50d2dc931ec2a00a42676cdd41599fceba0a4f98a2edbdbd
                                          • Instruction ID: 4ba3b5aa5a3a47eb37738214dd3418c0fee39a00dbbb6c0685ffedb8d4463a00
                                          • Opcode Fuzzy Hash: 37ec343f62c50c9c50d2dc931ec2a00a42676cdd41599fceba0a4f98a2edbdbd
                                          • Instruction Fuzzy Hash: EDF0FC3550660077DF627734BC07EAF25D9AFC17E1F250419F824D65D3EF248942B1A0
                                          APIs
                                            • Part of subcall function 00079639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00079693
                                            • Part of subcall function 00079639: SelectObject.GDI32(?,00000000), ref: 000796A2
                                            • Part of subcall function 00079639: BeginPath.GDI32(?), ref: 000796B9
                                            • Part of subcall function 00079639: SelectObject.GDI32(?,00000000), ref: 000796E2
                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 000F8A4E
                                          • LineTo.GDI32(?,00000003,00000000), ref: 000F8A62
                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 000F8A70
                                          • LineTo.GDI32(?,00000000,00000003), ref: 000F8A80
                                          • EndPath.GDI32(?), ref: 000F8A90
                                          • StrokePath.GDI32(?), ref: 000F8AA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                          • String ID:
                                          • API String ID: 43455801-0
                                          • Opcode ID: 32f85ff252690067cfb5555db3210fca3134f83ce64594a7ed9c7d274cab58f6
                                          • Instruction ID: 40f9a276e1362609edaa70d14620239f90ed94a3619c76d338882f6e80830710
                                          • Opcode Fuzzy Hash: 32f85ff252690067cfb5555db3210fca3134f83ce64594a7ed9c7d274cab58f6
                                          • Instruction Fuzzy Hash: BB110C7600010DFFEB119F90DC49EEA7F6CEB04364F008412BA1995561C7759D55EB60
                                          APIs
                                          • GetDC.USER32(00000000), ref: 000C5218
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 000C5229
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 000C5230
                                          • ReleaseDC.USER32(00000000,00000000), ref: 000C5238
                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 000C524F
                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 000C5261
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: 1b1b9bbd48bdbe8416a8459d36945f7d97ae80b021173b963d677d7959d480e2
                                          • Instruction ID: 39ffaf18a10ac5ed0a5b6b71fe475cf4d9a809332e07abbc6f5530a2302bf90b
                                          • Opcode Fuzzy Hash: 1b1b9bbd48bdbe8416a8459d36945f7d97ae80b021173b963d677d7959d480e2
                                          • Instruction Fuzzy Hash: F5018F75A00709BBFB109BA59D4AF6EBFB8EF48351F044065FA04E7381DA709800DBA0
                                          APIs
                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00061BF4
                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00061BFC
                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00061C07
                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00061C12
                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00061C1A
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00061C22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Virtual
                                          • String ID:
                                          • API String ID: 4278518827-0
                                          • Opcode ID: 5e20c7401225125bb387f498752579b388b26052aa2e7b2eee37bfe065eb6c8f
                                          • Instruction ID: 8f104f5e084e9e6c9446c725c022e5cb24f940c6248c35799ca3f2dd013a1728
                                          • Opcode Fuzzy Hash: 5e20c7401225125bb387f498752579b388b26052aa2e7b2eee37bfe065eb6c8f
                                          • Instruction Fuzzy Hash: CD016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 000CEB30
                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 000CEB46
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 000CEB55
                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 000CEB64
                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 000CEB6E
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 000CEB75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                          • String ID:
                                          • API String ID: 839392675-0
                                          • Opcode ID: 8f0ad48883e36883e2296161aa0c873d2d98df528e9fb7366094c78bcdebe534
                                          • Instruction ID: 805d33b71a28201fc01039b416b29b053231b2b5c2edd0e923140faeb666f58f
                                          • Opcode Fuzzy Hash: 8f0ad48883e36883e2296161aa0c873d2d98df528e9fb7366094c78bcdebe534
                                          • Instruction Fuzzy Hash: 44F01772240158BBF7215B629D0EEFF3A7CEFCAB15F000158FA01D14919BA85A01E6B5
                                          APIs
                                          • GetClientRect.USER32(?), ref: 000B7452
                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 000B7469
                                          • GetWindowDC.USER32(?), ref: 000B7475
                                          • GetPixel.GDI32(00000000,?,?), ref: 000B7484
                                          • ReleaseDC.USER32(?,00000000), ref: 000B7496
                                          • GetSysColor.USER32(00000005), ref: 000B74B0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                          • String ID:
                                          • API String ID: 272304278-0
                                          • Opcode ID: 42043ce6a3ed032c7f7b3d0c5afc9bba878e6c8cd93ab035bcd0cfe1b5224cc2
                                          • Instruction ID: cd88bcd06e1452c6f6082a7b92aebef163a8752e0d61f870bd74d5d90b903370
                                          • Opcode Fuzzy Hash: 42043ce6a3ed032c7f7b3d0c5afc9bba878e6c8cd93ab035bcd0cfe1b5224cc2
                                          • Instruction Fuzzy Hash: 1E017831404609EFFB509F64DD0AFFA7BB5FB04322F240060F919A25A0CB351E91EB10
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000C187F
                                          • UnloadUserProfile.USERENV(?,?), ref: 000C188B
                                          • CloseHandle.KERNEL32(?), ref: 000C1894
                                          • CloseHandle.KERNEL32(?), ref: 000C189C
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 000C18A5
                                          • HeapFree.KERNEL32(00000000), ref: 000C18AC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                          • String ID:
                                          • API String ID: 146765662-0
                                          • Opcode ID: 91e238c5aae3221c766aa6828a0d82374ded7e08607c2d4b86a77ada523bf68e
                                          • Instruction ID: 48236e423f3644afa0f75e1ba183dcf8019c305e5cdeefec923cccf75082fffa
                                          • Opcode Fuzzy Hash: 91e238c5aae3221c766aa6828a0d82374ded7e08607c2d4b86a77ada523bf68e
                                          • Instruction Fuzzy Hash: FBE0C936004509BBF6015BA1EE0DD15BF29FF4A7217108220F22581870CB365430FB50
                                          APIs
                                            • Part of subcall function 00067620: _wcslen.LIBCMT ref: 00067625
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 000CC6EE
                                          • _wcslen.LIBCMT ref: 000CC735
                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 000CC79C
                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 000CC7CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info_wcslen$Default
                                          • String ID: 0
                                          • API String ID: 1227352736-4108050209
                                          • Opcode ID: f8326debe735f2b45962f7f27eb8ff141ec7f13037133362ae47cfbba1ab4011
                                          • Instruction ID: 0cea572b29f1053a214ee64884fff4c0daecd50c8d99a7ec71e2631dad59dfb8
                                          • Opcode Fuzzy Hash: f8326debe735f2b45962f7f27eb8ff141ec7f13037133362ae47cfbba1ab4011
                                          • Instruction Fuzzy Hash: 3751BF716083019BE7A49F28C985FAFB7E4EF49314F040A2DF99AE31A1DB74D944CB52
                                          APIs
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 000EAEA3
                                            • Part of subcall function 00067620: _wcslen.LIBCMT ref: 00067625
                                          • GetProcessId.KERNEL32(00000000), ref: 000EAF38
                                          • CloseHandle.KERNEL32(00000000), ref: 000EAF67
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                          • String ID: <$@
                                          • API String ID: 146682121-1426351568
                                          • Opcode ID: cb31de276242a4238e033623f5a0279f6122cbed475843fb063ff0ee877d0e32
                                          • Instruction ID: f043aee953360ee33d40700c19e29a3889b804bcb71eadc38530047e108ca80d
                                          • Opcode Fuzzy Hash: cb31de276242a4238e033623f5a0279f6122cbed475843fb063ff0ee877d0e32
                                          • Instruction Fuzzy Hash: 1B718C70A00659DFCB14EF95C484A9EBBF1FF09314F0484A9E85AAB392CB74ED45CB91
                                          APIs
                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 000C7206
                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 000C723C
                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 000C724D
                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 000C72CF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                          • String ID: DllGetClassObject
                                          • API String ID: 753597075-1075368562
                                          • Opcode ID: 0ffd9c62ddbd28933ebd18834b3123854daf5fdaea47f4639f453b4a5970701c
                                          • Instruction ID: d0c75e254ce1f0174211b0b712bcb176ff97bf0de2a9c4114c620ca519e64436
                                          • Opcode Fuzzy Hash: 0ffd9c62ddbd28933ebd18834b3123854daf5fdaea47f4639f453b4a5970701c
                                          • Instruction Fuzzy Hash: EE414A71A04204AFEB25CF54C885FAE7BA9EF45310F2480ADBD099F20AD7B5D945DFA0
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 000F3E35
                                          • IsMenu.USER32(?), ref: 000F3E4A
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 000F3E92
                                          • DrawMenuBar.USER32 ref: 000F3EA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$Item$DrawInfoInsert
                                          • String ID: 0
                                          • API String ID: 3076010158-4108050209
                                          • Opcode ID: fca4fe8a3157041adf70c8d7dbfd186c6e0535f1e447f4325893ad4455f2c953
                                          • Instruction ID: 4f6b9a46b3b20184c2b1145f10de3a5aa3413cf93a78a60fc6ec1aa2114289ae
                                          • Opcode Fuzzy Hash: fca4fe8a3157041adf70c8d7dbfd186c6e0535f1e447f4325893ad4455f2c953
                                          • Instruction Fuzzy Hash: F1412575A0020DAFDF10DF50D884EEABBF9FF49364F044129EA05A7690D734AE45EB50
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 000C3CCA
                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 000C1E66
                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 000C1E79
                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 000C1EA9
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen$ClassName
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 2081771294-1403004172
                                          • Opcode ID: 3ea866cc0d5b6110ef92306c1e14e0b15e865239315c0d2e1a19ebc7e4a74000
                                          • Instruction ID: 27b5109c52cb920c480d67a82a855eb794eb8961bf68a9f99ef445d68308c2a9
                                          • Opcode Fuzzy Hash: 3ea866cc0d5b6110ef92306c1e14e0b15e865239315c0d2e1a19ebc7e4a74000
                                          • Instruction Fuzzy Hash: C2210571A00108BEEB14AB64DD86DFFB7BADF46360B10811DF825E75E2DB78490AD620
                                          APIs
                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 000F2F8D
                                          • LoadLibraryW.KERNEL32(?), ref: 000F2F94
                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 000F2FA9
                                          • DestroyWindow.USER32(?), ref: 000F2FB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                          • String ID: SysAnimate32
                                          • API String ID: 3529120543-1011021900
                                          • Opcode ID: 58ef10116bf223dbeb0a52d2101e6dd765013b6be29a22f1b4ba40ada38e4c85
                                          • Instruction ID: 3e0fe5d82b4b4c36b5578cdc538e082a43fcd3d14d10a15dfc9335803ae69a0e
                                          • Opcode Fuzzy Hash: 58ef10116bf223dbeb0a52d2101e6dd765013b6be29a22f1b4ba40ada38e4c85
                                          • Instruction Fuzzy Hash: C521AC7122420DABEB108FA4DC81EBB37B9EB99364F104638FA50D29A0D771DC95A760
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00084D1E,000928E9,?,00084CBE,000928E9,001288B8,0000000C,00084E15,000928E9,00000002), ref: 00084D8D
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00084DA0
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00084D1E,000928E9,?,00084CBE,000928E9,001288B8,0000000C,00084E15,000928E9,00000002,00000000), ref: 00084DC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 934ad8e1686e3ca43349f9d75082fb7b3f1c594d17d57ae0b73ecdb26eb4a35f
                                          • Instruction ID: 9e47b5e58e6cd39f68945d8a5508d235994fdd060e563dd543c277f5649a8ce1
                                          • Opcode Fuzzy Hash: 934ad8e1686e3ca43349f9d75082fb7b3f1c594d17d57ae0b73ecdb26eb4a35f
                                          • Instruction Fuzzy Hash: 65F0AF34A0030DBBEB11AF90DC4AFADBBF5FF44751F0000A8F845A2AA0CB785A50DB91
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00064EDD,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E9C
                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00064EAE
                                          • FreeLibrary.KERNEL32(00000000,?,?,00064EDD,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064EC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-3689287502
                                          • Opcode ID: 238782ac1c34c8a8c8a218a7992ec8aa0ee53789371d74e8edb5877e73267c94
                                          • Instruction ID: 2ee2fa6c6f67ff398b4067738c51d733cf9a35589232c7c998a98be0620a82c8
                                          • Opcode Fuzzy Hash: 238782ac1c34c8a8c8a218a7992ec8aa0ee53789371d74e8edb5877e73267c94
                                          • Instruction Fuzzy Hash: C2E0C236E026365BF2721B25BD2AF7F66A9BF82F62B050115FD04E2A00DB78CD11D4A0
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,000A3CDE,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E62
                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00064E74
                                          • FreeLibrary.KERNEL32(00000000,?,?,000A3CDE,?,00131418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00064E87
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-1355242751
                                          • Opcode ID: 874b70635e39cc5fc9167de3935ee8f6cbbcb1df730fc18b35f5b77747460000
                                          • Instruction ID: 44ea5f4be64e7718d8f499c35dc0ee60c6a94f2dc735f2138f2d73c4527aa816
                                          • Opcode Fuzzy Hash: 874b70635e39cc5fc9167de3935ee8f6cbbcb1df730fc18b35f5b77747460000
                                          • Instruction Fuzzy Hash: 07D02B395026365BB6321B247C1EDEF2A59BF83F113050111F904E2510CF39CD11D1D0
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 000EA427
                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 000EA435
                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 000EA468
                                          • CloseHandle.KERNEL32(?), ref: 000EA63D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                          • String ID:
                                          • API String ID: 3488606520-0
                                          • Opcode ID: 87b729526dbf8fdf31e64eb4e6f8aaf37102d067b42ec8c6321f655277867525
                                          • Instruction ID: f85c0511d0f88010d052accd0dc5fef333d5c8c89f0bf7d48a306446ffb231b6
                                          • Opcode Fuzzy Hash: 87b729526dbf8fdf31e64eb4e6f8aaf37102d067b42ec8c6321f655277867525
                                          • Instruction Fuzzy Hash: 6FA1B0B16047019FE720DF24C886F6AB7E1AF88714F14885DF59A9B292D7B0EC41CB92
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00103700), ref: 0009BB91
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0013121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0009BC09
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00131270,000000FF,?,0000003F,00000000,?), ref: 0009BC36
                                          • _free.LIBCMT ref: 0009BB7F
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 0009BD4B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: 800684c0b5f63d753b67a9620ebd4b52824d756cfa6f0563633c8465a6318bd4
                                          • Instruction ID: 4f2157acf2eb49aae985bcad338219363e5292bed7f2da3bb50c0779d628cb19
                                          • Opcode Fuzzy Hash: 800684c0b5f63d753b67a9620ebd4b52824d756cfa6f0563633c8465a6318bd4
                                          • Instruction Fuzzy Hash: 7C51DB71904209AFDF20DF65AE819AEB7F8EF41330B10426AE554D71A1EB709E41AB90
                                          APIs
                                            • Part of subcall function 000CDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,000CCF22,?), ref: 000CDDFD
                                            • Part of subcall function 000CDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,000CCF22,?), ref: 000CDE16
                                            • Part of subcall function 000CE199: GetFileAttributesW.KERNEL32(?,000CCF95), ref: 000CE19A
                                          • lstrcmpiW.KERNEL32(?,?), ref: 000CE473
                                          • MoveFileW.KERNEL32(?,?), ref: 000CE4AC
                                          • _wcslen.LIBCMT ref: 000CE5EB
                                          • _wcslen.LIBCMT ref: 000CE603
                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 000CE650
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                          • String ID:
                                          • API String ID: 3183298772-0
                                          • Opcode ID: 6463df5d67e9ccd842d43e5fc917ebc7f1aba486f19a2072f7b1895066335c5a
                                          • Instruction ID: db746b398a43767bdee610b638cc53808960b001487cb5c09ee92fcc959d80ae
                                          • Opcode Fuzzy Hash: 6463df5d67e9ccd842d43e5fc917ebc7f1aba486f19a2072f7b1895066335c5a
                                          • Instruction Fuzzy Hash: 695163B24087855BD764EB90DC81EDF73DCAF95340F00492EF689D3192EF74A6888766
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000EC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,000EB6AE,?,?), ref: 000EC9B5
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000EC9F1
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA68
                                            • Part of subcall function 000EC998: _wcslen.LIBCMT ref: 000ECA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 000EBAA5
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 000EBB00
                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 000EBB63
                                          • RegCloseKey.ADVAPI32(?,?), ref: 000EBBA6
                                          • RegCloseKey.ADVAPI32(00000000), ref: 000EBBB3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                          • String ID:
                                          • API String ID: 826366716-0
                                          • Opcode ID: b9967864fb51eb1397fb2208179c860ea2aa9fdd267633a6d1c213ccb35c98a6
                                          • Instruction ID: e8848eba2921f59580530ed136229e3dd713e68f4c1f45fc78bfc5901ab8db97
                                          • Opcode Fuzzy Hash: b9967864fb51eb1397fb2208179c860ea2aa9fdd267633a6d1c213ccb35c98a6
                                          • Instruction Fuzzy Hash: 91619031208241AFD714DF15C891E6BBBE9FF84308F54856CF4999B2A2DB31ED45CB92
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 000C8BCD
                                          • VariantClear.OLEAUT32 ref: 000C8C3E
                                          • VariantClear.OLEAUT32 ref: 000C8C9D
                                          • VariantClear.OLEAUT32(?), ref: 000C8D10
                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 000C8D3B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ChangeInitType
                                          • String ID:
                                          • API String ID: 4136290138-0
                                          • Opcode ID: f864be5c7007a7805a6aef73f76d005530b644b2c953ee28f9c4d8a7e52e84d2
                                          • Instruction ID: 87bd7533c31acb695a7807c706c340d08d54d8888a20fc4a052461a1e9c4c5fa
                                          • Opcode Fuzzy Hash: f864be5c7007a7805a6aef73f76d005530b644b2c953ee28f9c4d8a7e52e84d2
                                          • Instruction Fuzzy Hash: B25168B5A00219EFDB14CF68D884EAAB7F8FF89310F158569E906DB350E734E911CB94
                                          APIs
                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 000D8BAE
                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 000D8BDA
                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 000D8C32
                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 000D8C57
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 000D8C5F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: PrivateProfile$SectionWrite$String
                                          • String ID:
                                          • API String ID: 2832842796-0
                                          • Opcode ID: 6b1bdf2b00801b51b22e999603f7159e05925da42eb93389cb26b09036e84d68
                                          • Instruction ID: ef25b75195d78f151beeaef4ea1d619cff8baf1f4ce82767f605b1167c9ccf27
                                          • Opcode Fuzzy Hash: 6b1bdf2b00801b51b22e999603f7159e05925da42eb93389cb26b09036e84d68
                                          • Instruction Fuzzy Hash: 78513C35A00615DFDB04DF64C881EA9BBF5FF48314F088099E849AB362DB35ED51DBA0
                                          APIs
                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 000E8F40
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 000E8FD0
                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 000E8FEC
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 000E9032
                                          • FreeLibrary.KERNEL32(00000000), ref: 000E9052
                                            • Part of subcall function 0007F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,000D1043,?,7644E610), ref: 0007F6E6
                                            • Part of subcall function 0007F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000BFA64,00000000,00000000,?,?,000D1043,?,7644E610,?,000BFA64), ref: 0007F70D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                          • String ID:
                                          • API String ID: 666041331-0
                                          • Opcode ID: ffb66b59a5a6ab1b38cd00056b6cfad6b373372d73de56d7b89b548cc7744517
                                          • Instruction ID: dc55b9d3446c88bad30379e2329423ae4b59dd2b2eb31cb56459b159848f3034
                                          • Opcode Fuzzy Hash: ffb66b59a5a6ab1b38cd00056b6cfad6b373372d73de56d7b89b548cc7744517
                                          • Instruction Fuzzy Hash: EC513834600245DFDB15DF59C4949EDBBF1FF49324B4880A9E80AAB762DB31ED85CB90
                                          APIs
                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 000F6C33
                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 000F6C4A
                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 000F6C73
                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,000DAB79,00000000,00000000), ref: 000F6C98
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 000F6CC7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Long$MessageSendShow
                                          • String ID:
                                          • API String ID: 3688381893-0
                                          • Opcode ID: 24eaf6189be4713530a850e0f6d6ba07fc8338766a2a9a197d20135f91853c54
                                          • Instruction ID: 75204467ecc839480d087c3586a04291399d514b0adbd21cdae6fd114a47ac82
                                          • Opcode Fuzzy Hash: 24eaf6189be4713530a850e0f6d6ba07fc8338766a2a9a197d20135f91853c54
                                          • Instruction Fuzzy Hash: DA41B33560410CAFE724DF68CD59FB97BE5EB09350F150228FA95E7AE1C372AD41EA80
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 9efe39f6c51aa9f303d975e5dee8402e123d793a843a577d4d89cfb54631bc91
                                          • Instruction ID: fe39e017c848f9084ae968e49d5a949f3a3fbe6f616e407fc63ab28947f15530
                                          • Opcode Fuzzy Hash: 9efe39f6c51aa9f303d975e5dee8402e123d793a843a577d4d89cfb54631bc91
                                          • Instruction Fuzzy Hash: EE41D232A00204AFCF24DF78C881AAEB7E5EF89314F154568E615EB392DB31AD11DB81
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00079141
                                          • ScreenToClient.USER32(00000000,?), ref: 0007915E
                                          • GetAsyncKeyState.USER32(00000001), ref: 00079183
                                          • GetAsyncKeyState.USER32(00000002), ref: 0007919D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: AsyncState$ClientCursorScreen
                                          • String ID:
                                          • API String ID: 4210589936-0
                                          • Opcode ID: 1f0a9bc03cb0da4b99d506fe956a41652f11d2879700781d4f144f23030c482e
                                          • Instruction ID: feef574852cfa1e5a3aff1033961d84e129486c488f7cc060061972d799b8831
                                          • Opcode Fuzzy Hash: 1f0a9bc03cb0da4b99d506fe956a41652f11d2879700781d4f144f23030c482e
                                          • Instruction Fuzzy Hash: F3418171A0860AFBDF159F68C844BFEB7B4FF45320F208615E429A72D0C7345994DBA1
                                          APIs
                                          • GetInputState.USER32 ref: 000D38CB
                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 000D3922
                                          • TranslateMessage.USER32(?), ref: 000D394B
                                          • DispatchMessageW.USER32(?), ref: 000D3955
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000D3966
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                          • String ID:
                                          • API String ID: 2256411358-0
                                          • Opcode ID: 6fa64d02449e4ebee1a913ad749088869fe985a84765785e0ad5b47ba355bac6
                                          • Instruction ID: b98fb7afc8b0e4bc01c27537cddf22c543e0eba3503a082d0168474823a08140
                                          • Opcode Fuzzy Hash: 6fa64d02449e4ebee1a913ad749088869fe985a84765785e0ad5b47ba355bac6
                                          • Instruction Fuzzy Hash: BB31B770904345AEEB75CB34D859FB6B7E8AB05314F04056FE462826E0E7F49AC4DB32
                                          APIs
                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 000DCF38
                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 000DCF6F
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,000DC21E,00000000), ref: 000DCFB4
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,000DC21E,00000000), ref: 000DCFC8
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,000DC21E,00000000), ref: 000DCFF2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                          • String ID:
                                          • API String ID: 3191363074-0
                                          • Opcode ID: ef670431e7545650a5c1aa73a72e9e150e10f001d70e47cbfc1c38d852cd2d25
                                          • Instruction ID: 4c3bf533d62265e863c96906a0948fd10725c5fdd365538d58bebb288c4b1da0
                                          • Opcode Fuzzy Hash: ef670431e7545650a5c1aa73a72e9e150e10f001d70e47cbfc1c38d852cd2d25
                                          • Instruction Fuzzy Hash: 28313C7150430AAFEB60DFA5C985EAEBBF9EB14350B10443EF506D2251DB34AE40DB60
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 000C1915
                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 000C19C1
                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 000C19C9
                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 000C19DA
                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 000C19E2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessagePostSleep$RectWindow
                                          • String ID:
                                          • API String ID: 3382505437-0
                                          • Opcode ID: 23a1d8afc0360bca605baa0567af44996c7a9c0008c331c34e393cc4c66de4f9
                                          • Instruction ID: 7fd47965854ec302c9db38826eff9e1f4013db808f25093077636d0bf92249ff
                                          • Opcode Fuzzy Hash: 23a1d8afc0360bca605baa0567af44996c7a9c0008c331c34e393cc4c66de4f9
                                          • Instruction Fuzzy Hash: E631AD71A00219EFEB10CFA8C999FEE7BB5EB06315F104229F921E72D2C7709954DB90
                                          APIs
                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 000F5745
                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 000F579D
                                          • _wcslen.LIBCMT ref: 000F57AF
                                          • _wcslen.LIBCMT ref: 000F57BA
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 000F5816
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen
                                          • String ID:
                                          • API String ID: 763830540-0
                                          • Opcode ID: e9ad4783eb99ab16be43dd4a71af50f84fc0d325d3ccd3b530553bf3d6b2b2fd
                                          • Instruction ID: d0dc4e5d9b91d793a3b9c280d8cb650538b958bea38fbcb8ea044761ad9bcc1a
                                          • Opcode Fuzzy Hash: e9ad4783eb99ab16be43dd4a71af50f84fc0d325d3ccd3b530553bf3d6b2b2fd
                                          • Instruction Fuzzy Hash: 8F21A53190861C9AEB209F60DC85AFE77B8FF04325F108216EB19EA581D7709985DF50
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 000E0951
                                          • GetForegroundWindow.USER32 ref: 000E0968
                                          • GetDC.USER32(00000000), ref: 000E09A4
                                          • GetPixel.GDI32(00000000,?,00000003), ref: 000E09B0
                                          • ReleaseDC.USER32(00000000,00000003), ref: 000E09E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ForegroundPixelRelease
                                          • String ID:
                                          • API String ID: 4156661090-0
                                          • Opcode ID: 519ce83b1e6dfbb0704571940df71aa2c7193c488fc3ae6b2601db91bca8b21b
                                          • Instruction ID: f0e7aeb75401aa6fc5e12e356a396719527e60df4a1a5edabfb69ef325342170
                                          • Opcode Fuzzy Hash: 519ce83b1e6dfbb0704571940df71aa2c7193c488fc3ae6b2601db91bca8b21b
                                          • Instruction Fuzzy Hash: CB21AE35600204AFE704EF65D989EAEBBE9EF48700F048029F84AE7762DB74AC44DB50
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 0009CDC6
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0009CDE9
                                            • Part of subcall function 00093820: RtlAllocateHeap.NTDLL(00000000,?,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6,?,00061129), ref: 00093852
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0009CE0F
                                          • _free.LIBCMT ref: 0009CE22
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0009CE31
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: 091b87829de52375c680d2270d1221c5f93731427df85e57933aff75c65837a9
                                          • Instruction ID: 511839a533ec7bc4437d97cdb447e2187c670ea75c4ac554ddd38345708bee4f
                                          • Opcode Fuzzy Hash: 091b87829de52375c680d2270d1221c5f93731427df85e57933aff75c65837a9
                                          • Instruction Fuzzy Hash: 17018472E022157F3B2156B66C89D7F69ADEFC6BA13150129F906C7201EA658E01F2B0
                                          APIs
                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00079693
                                          • SelectObject.GDI32(?,00000000), ref: 000796A2
                                          • BeginPath.GDI32(?), ref: 000796B9
                                          • SelectObject.GDI32(?,00000000), ref: 000796E2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: 61cf6278b26abed11e9d7e757e64f8da70f50de988fc6ae921cf16046ab39db7
                                          • Instruction ID: 8d5b8adcc286f682fe8a60a825ebc4fb253904285cf28db18e31a68a00dc13eb
                                          • Opcode Fuzzy Hash: 61cf6278b26abed11e9d7e757e64f8da70f50de988fc6ae921cf16046ab39db7
                                          • Instruction Fuzzy Hash: 6F218E30802305FBEB119F64ED09BA93BA8BB41729F108316F418A65B0D37898D1DB98
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: 6b4fca711fdf681272961847fd57684c0c968539dd2443877694875708c16fbc
                                          • Instruction ID: 45dbf19870d6ce76ba156eb3d6d1636b72ea5e8f3fc83dda14fdc4c1616bd153
                                          • Opcode Fuzzy Hash: 6b4fca711fdf681272961847fd57684c0c968539dd2443877694875708c16fbc
                                          • Instruction Fuzzy Hash: 1F01D679245609BA92186310AE42FFE639CAF21396B000128FE049E642F7A0FE9192E4
                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,0008F2DE,00093863,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6), ref: 00092DFD
                                          • _free.LIBCMT ref: 00092E32
                                          • _free.LIBCMT ref: 00092E59
                                          • SetLastError.KERNEL32(00000000,00061129), ref: 00092E66
                                          • SetLastError.KERNEL32(00000000,00061129), ref: 00092E6F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: 91b2f451dc342fa8cfef8d761ca7e7e84dd05521efa86a2ce79b51e6f3b59974
                                          • Instruction ID: d86151477328ff50d0fe07a9f08205c9b0b207cc3708a418a2e30f601edb60d7
                                          • Opcode Fuzzy Hash: 91b2f451dc342fa8cfef8d761ca7e7e84dd05521efa86a2ce79b51e6f3b59974
                                          • Instruction Fuzzy Hash: B001F4726056007BDE22A7746CC6DAF26DDAFD13A5B210028F425A2193EB748C1171A0
                                          APIs
                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?,?,000C035E), ref: 000C002B
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?), ref: 000C0046
                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?), ref: 000C0054
                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?), ref: 000C0064
                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,000BFF41,80070057,?,?), ref: 000C0070
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                          • String ID:
                                          • API String ID: 3897988419-0
                                          • Opcode ID: 31091adfc7eef354fc29aac864c09c603941f99fa8ec5e4e5a09e32f26876533
                                          • Instruction ID: 84e73e8ca390c0f34e8db6717245d39e7d19d973aa540bbcb49cf12e078cc27a
                                          • Opcode Fuzzy Hash: 31091adfc7eef354fc29aac864c09c603941f99fa8ec5e4e5a09e32f26876533
                                          • Instruction Fuzzy Hash: 39018F72600209FFEB108F68DD05FAE7AEDEB44791F254128F905D2210DB75DD40DBA0
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 000CE997
                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 000CE9A5
                                          • Sleep.KERNEL32(00000000), ref: 000CE9AD
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 000CE9B7
                                          • Sleep.KERNEL32 ref: 000CE9F3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                          • String ID:
                                          • API String ID: 2833360925-0
                                          • Opcode ID: 85fe0a9ce241a292450c60d4b2de37ec769d9bb1281d5710309085e1d03e7d43
                                          • Instruction ID: 2463747da8bb6e574e50f705b2cdc9a8fe8dcb6d396885c45f4ffdd93ae20b4a
                                          • Opcode Fuzzy Hash: 85fe0a9ce241a292450c60d4b2de37ec769d9bb1281d5710309085e1d03e7d43
                                          • Instruction Fuzzy Hash: 27015731C0162DDBEF40ABE4D94AEEDBB78FF0A300F00055AE502B2241CB349651DBA2
                                          APIs
                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 000C1114
                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1120
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C112F
                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,000C0B9B,?,?,?), ref: 000C1136
                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 000C114D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 842720411-0
                                          • Opcode ID: 6121a1fffbdf77d0590efe048c4f71509962838cbf2da7831e718d0e25b5710b
                                          • Instruction ID: aa35800ad083e6207bc79c8af8c45fa8cd8fd3193b208572b62a10e6a3f0e3b5
                                          • Opcode Fuzzy Hash: 6121a1fffbdf77d0590efe048c4f71509962838cbf2da7831e718d0e25b5710b
                                          • Instruction Fuzzy Hash: 84016D75100309BFEB115FA4DD4AEAA3BAEEF863A0B140418FA41C3350DB35DC10DA60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 000C0FCA
                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 000C0FD6
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 000C0FE5
                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 000C0FEC
                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 000C1002
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 5661f7c83188bc91dc95267b97cd9349c5cac91fc216c08efbfb21c5ac3d598e
                                          • Instruction ID: 4e72c7d0beb23dca39bd9035364b78754be3a9f91ff074e6c169c59a2863909a
                                          • Opcode Fuzzy Hash: 5661f7c83188bc91dc95267b97cd9349c5cac91fc216c08efbfb21c5ac3d598e
                                          • Instruction Fuzzy Hash: 15F04935200309ABEB214FA49D4AFAA3BADFF8A762F214419FA45C6251CA74DC50DA60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 000C102A
                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 000C1036
                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 000C1045
                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 000C104C
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 000C1062
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 857153678a8ac0a30b7618ec25f64d858fe69aef7e761854fe9b51c8729d242e
                                          • Instruction ID: 093f61264de7c0eb0637194bade5f9d27d1ded156b2f5d3259d1b49a5407dd1b
                                          • Opcode Fuzzy Hash: 857153678a8ac0a30b7618ec25f64d858fe69aef7e761854fe9b51c8729d242e
                                          • Instruction Fuzzy Hash: 52F06235140305EBF7215FA4ED4AFAA3BADFF8A761F210414FD45C7251CA74D960DA60
                                          APIs
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D0324
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D0331
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D033E
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D034B
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D0358
                                          • CloseHandle.KERNEL32(?,?,?,?,000D017D,?,000D32FC,?,00000001,000A2592,?), ref: 000D0365
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: ade67622b3234578ea7d8613d90b01f069a5fdad806786dcae591d013fd6ad5d
                                          • Instruction ID: 900250d5d2f85e2e01edb008c1918e4703d3d0af2d15f15f2a92108b663aef85
                                          • Opcode Fuzzy Hash: ade67622b3234578ea7d8613d90b01f069a5fdad806786dcae591d013fd6ad5d
                                          • Instruction Fuzzy Hash: 4C01AE72800B559FCB30AF66D880916FBF9BF603153158A3FD19A52A31C3B1AA58DF90
                                          APIs
                                          • _free.LIBCMT ref: 0009D752
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 0009D764
                                          • _free.LIBCMT ref: 0009D776
                                          • _free.LIBCMT ref: 0009D788
                                          • _free.LIBCMT ref: 0009D79A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 46042543aa516d494921943f067adabd971fd4850f3f138f798e4f2d4e310f13
                                          • Instruction ID: 94ad35b39aafd01115aad587a9e18ae3b29e3649792bcf16f825b4263aebdbe9
                                          • Opcode Fuzzy Hash: 46042543aa516d494921943f067adabd971fd4850f3f138f798e4f2d4e310f13
                                          • Instruction Fuzzy Hash: 91F0FF32588205BB8E61EBA4F9C5C5AB7DDBB447107A40806F18CE7902D720FCC0A6E4
                                          APIs
                                          • GetDlgItem.USER32(?,000003E9), ref: 000C5C58
                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 000C5C6F
                                          • MessageBeep.USER32(00000000), ref: 000C5C87
                                          • KillTimer.USER32(?,0000040A), ref: 000C5CA3
                                          • EndDialog.USER32(?,00000001), ref: 000C5CBD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                          • String ID:
                                          • API String ID: 3741023627-0
                                          • Opcode ID: 20ed89726da3595b0169d2e7d22df616f90b79f35167c14e15eaa06030a46c9b
                                          • Instruction ID: 1420a1f9e280d290425dac81ff9fddf5ef1471364e0c37035e7c3fd317ead49f
                                          • Opcode Fuzzy Hash: 20ed89726da3595b0169d2e7d22df616f90b79f35167c14e15eaa06030a46c9b
                                          • Instruction Fuzzy Hash: 3F011234504B08AFFB215B10DE8FFAA77B8BB04B06F04155DA593A14E1DBF4B988DA90
                                          APIs
                                          • _free.LIBCMT ref: 000922BE
                                            • Part of subcall function 000929C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000), ref: 000929DE
                                            • Part of subcall function 000929C8: GetLastError.KERNEL32(00000000,?,0009D7D1,00000000,00000000,00000000,00000000,?,0009D7F8,00000000,00000007,00000000,?,0009DBF5,00000000,00000000), ref: 000929F0
                                          • _free.LIBCMT ref: 000922D0
                                          • _free.LIBCMT ref: 000922E3
                                          • _free.LIBCMT ref: 000922F4
                                          • _free.LIBCMT ref: 00092305
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 9d2b8fa697516ebfae1c6f7b655cd148bfd33789af0ce8face5c5a04988d2d10
                                          • Instruction ID: 3ca4e57cca68b9d99c5fec3bda053e494ffb8c03a322dbf0e29967fdecedfdb5
                                          • Opcode Fuzzy Hash: 9d2b8fa697516ebfae1c6f7b655cd148bfd33789af0ce8face5c5a04988d2d10
                                          • Instruction Fuzzy Hash: 7DF0FE75801520BBCE23EF54BC1188D3BA9F718B61715454AF458D6AB2C73109E2FFE4
                                          APIs
                                          • EndPath.GDI32(?), ref: 000795D4
                                          • StrokeAndFillPath.GDI32(?,?,000B71F7,00000000,?,?,?), ref: 000795F0
                                          • SelectObject.GDI32(?,00000000), ref: 00079603
                                          • DeleteObject.GDI32 ref: 00079616
                                          • StrokePath.GDI32(?), ref: 00079631
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                          • String ID:
                                          • API String ID: 2625713937-0
                                          • Opcode ID: 9557d7dd01bc28d63baae26919ed5f5602b12170498efa32b271195f4610170f
                                          • Instruction ID: 2a6432bb6e167ca0b28b7b5e9676662d75d2dd7b7f5710c5d8ac9e2f791fb058
                                          • Opcode Fuzzy Hash: 9557d7dd01bc28d63baae26919ed5f5602b12170498efa32b271195f4610170f
                                          • Instruction Fuzzy Hash: A1F0EC35405608EBEB269F65EE1DB743BA5BB0133AF048314F469558F0CB3889A5EF24
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: __freea$_free
                                          • String ID: a/p$am/pm
                                          • API String ID: 3432400110-3206640213
                                          • Opcode ID: b9cb620e7dc1cf44e3d88255e8a36105b957d165fdac74ea4e55d7a4487f72a4
                                          • Instruction ID: e56f6d5cd35125d4dc8eba7da68c116a20d710fdf356a737e5701f9695d9aa08
                                          • Opcode Fuzzy Hash: b9cb620e7dc1cf44e3d88255e8a36105b957d165fdac74ea4e55d7a4487f72a4
                                          • Instruction Fuzzy Hash: B3D10071B00207DADF689F68C845BFEB7F1EF05300F288159E9119BA91D3B59E81EB91
                                          APIs
                                            • Part of subcall function 00080242: EnterCriticalSection.KERNEL32(0013070C,00131884,?,?,0007198B,00132518,?,?,?,000612F9,00000000), ref: 0008024D
                                            • Part of subcall function 00080242: LeaveCriticalSection.KERNEL32(0013070C,?,0007198B,00132518,?,?,?,000612F9,00000000), ref: 0008028A
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000800A3: __onexit.LIBCMT ref: 000800A9
                                          • __Init_thread_footer.LIBCMT ref: 000E7BFB
                                            • Part of subcall function 000801F8: EnterCriticalSection.KERNEL32(0013070C,?,?,00078747,00132514), ref: 00080202
                                            • Part of subcall function 000801F8: LeaveCriticalSection.KERNEL32(0013070C,?,00078747,00132514), ref: 00080235
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                          • String ID: 5$G$Variable must be of type 'Object'.
                                          • API String ID: 535116098-3733170431
                                          • Opcode ID: eb9f53f5646a8d7751827ede39b1b0c03a493ee0c9d629b9ce87342c5dc61a0a
                                          • Instruction ID: 64ebdbe24c04d0c49773aed992a4e51bdbcaecd45aaeded431fa74337f38fd4a
                                          • Opcode Fuzzy Hash: eb9f53f5646a8d7751827ede39b1b0c03a493ee0c9d629b9ce87342c5dc61a0a
                                          • Instruction Fuzzy Hash: 92919A70A08249EFCB14EF95D981DFDB7B6BF49300F108059F80AAB292DB71AE41CB51
                                          APIs
                                            • Part of subcall function 000CB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,000C21D0,?,?,00000034,00000800,?,00000034), ref: 000CB42D
                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 000C2760
                                            • Part of subcall function 000CB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,000C21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 000CB3F8
                                            • Part of subcall function 000CB32A: GetWindowThreadProcessId.USER32(?,?), ref: 000CB355
                                            • Part of subcall function 000CB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,000C2194,00000034,?,?,00001004,00000000,00000000), ref: 000CB365
                                            • Part of subcall function 000CB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,000C2194,00000034,?,?,00001004,00000000,00000000), ref: 000CB37B
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 000C27CD
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 000C281A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                          • String ID: @
                                          • API String ID: 4150878124-2766056989
                                          • Opcode ID: 8aecb8cdf92b2d89cef71744fd9c298a0006f865f1d3f976d2d1c49feb35d43f
                                          • Instruction ID: 0900e7d668503ef3940ea13a826a30eddc527b1923666de02d8eaf333438ece2
                                          • Opcode Fuzzy Hash: 8aecb8cdf92b2d89cef71744fd9c298a0006f865f1d3f976d2d1c49feb35d43f
                                          • Instruction Fuzzy Hash: D6411B72900218AFDB10DBA4CD86FEEBBB8EF09700F104199FA55B7181DB706E45DBA1
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\LisectAVT_2403002A_257.exe,00000104), ref: 00091769
                                          • _free.LIBCMT ref: 00091834
                                          • _free.LIBCMT ref: 0009183E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
                                          • API String ID: 2506810119-952740674
                                          • Opcode ID: 272af5487bd2c127d06fdddc2494431296fd46b12b32c43aedcbed6910356e45
                                          • Instruction ID: f7e62c1e35265642207a60615509257c6cff95ebf577924dff6e585a5d217f71
                                          • Opcode Fuzzy Hash: 272af5487bd2c127d06fdddc2494431296fd46b12b32c43aedcbed6910356e45
                                          • Instruction Fuzzy Hash: 14318075B0421ABBDF21DB999885DDFBBFCEB85310B2441A6F80497211DA708E40EBA0
                                          APIs
                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 000CC306
                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 000CC34C
                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00131990,00BD46E8), ref: 000CC395
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$InfoItem
                                          • String ID: 0
                                          • API String ID: 135850232-4108050209
                                          • Opcode ID: f5cb2bce34b44ff75ddb72499334b90ebb4a365a38368244115f5a062c6357eb
                                          • Instruction ID: de3b8c87f36e396a18500d539d9d8f651dc47ec6bb0c33a1855ec55bdf370a23
                                          • Opcode Fuzzy Hash: f5cb2bce34b44ff75ddb72499334b90ebb4a365a38368244115f5a062c6357eb
                                          • Instruction Fuzzy Hash: 244180712043419FE724DF25E845F6EBBE8AF85310F14861DF9A9972D2D730AA04CB52
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,000FCC08,00000000,?,?,?,?), ref: 000F44AA
                                          • GetWindowLongW.USER32 ref: 000F44C7
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000F44D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID: SysTreeView32
                                          • API String ID: 847901565-1698111956
                                          • Opcode ID: 83b4f2c6742692d038a699f7b0f9cedf058e2f4172bfd102b19799f0740f48fd
                                          • Instruction ID: 62acef8b679cebb807b5c40f876f3b1eef389dd9c9d17e8b867b8f6f8fbc622b
                                          • Opcode Fuzzy Hash: 83b4f2c6742692d038a699f7b0f9cedf058e2f4172bfd102b19799f0740f48fd
                                          • Instruction Fuzzy Hash: 90319C31214609AFEB609E38DC46BEB77A9EB08324F204715FA79A25E1D774EC50AB50
                                          APIs
                                            • Part of subcall function 000E335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,000E3077,?,?), ref: 000E3378
                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 000E307A
                                          • _wcslen.LIBCMT ref: 000E309B
                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 000E3106
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                          • String ID: 255.255.255.255
                                          • API String ID: 946324512-2422070025
                                          • Opcode ID: d402e778596229aaec150f09a8e623a114714c2295f591fcf805491cc0898b6a
                                          • Instruction ID: c93e68f3f23bbfdc8011699c298946b28d0801999c51b3f962ad9db5b329cabe
                                          • Opcode Fuzzy Hash: d402e778596229aaec150f09a8e623a114714c2295f591fcf805491cc0898b6a
                                          • Instruction Fuzzy Hash: FF3107352002859FDB20CF6AC599EAABBE0EF54314F258099E915AB792CB32DF45C760
                                          APIs
                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 000F4705
                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 000F4713
                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 000F471A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyWindow
                                          • String ID: msctls_updown32
                                          • API String ID: 4014797782-2298589950
                                          • Opcode ID: 80302691af44b1d20dd962113f969c5564952733befcb5c5f2f870cc0f93139e
                                          • Instruction ID: 83f3bacb6f7439ca7f787991afbbce90c558be9a372015e68b22b0f8c3494f2b
                                          • Opcode Fuzzy Hash: 80302691af44b1d20dd962113f969c5564952733befcb5c5f2f870cc0f93139e
                                          • Instruction Fuzzy Hash: 55213EB5604209AFEB11EF64DC81DB737EDEF9A398B050059FA009B652CB71EC51DB60
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                          • API String ID: 176396367-2734436370
                                          • Opcode ID: 4a657b1b74a0fa9d3a7a23f717a48460183236f73a9f228dcc7a04a083419e65
                                          • Instruction ID: 7cde19bf8ce998a6017ec4e5c165fde73b0d787002e0078998b9dd6e84cac5e4
                                          • Opcode Fuzzy Hash: 4a657b1b74a0fa9d3a7a23f717a48460183236f73a9f228dcc7a04a083419e65
                                          • Instruction Fuzzy Hash: 30212B72204A1166D331BB24DC0AFFF73D8AF95314F54402EFA899B182EBA19D41D395
                                          APIs
                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 000F3840
                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 000F3850
                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 000F3876
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend$MoveWindow
                                          • String ID: Listbox
                                          • API String ID: 3315199576-2633736733
                                          • Opcode ID: 0f0278568c04e51ef195f28ef6dae6d0e70bdc918e56f8cdf1976b1a22b7ff50
                                          • Instruction ID: 679f137bdc1ac70eacf4e251f4545ef2bda5cacb838bac778030b1536af15d7f
                                          • Opcode Fuzzy Hash: 0f0278568c04e51ef195f28ef6dae6d0e70bdc918e56f8cdf1976b1a22b7ff50
                                          • Instruction Fuzzy Hash: 8B21B072604218BBEB219F54CC41FBB37AEEF897A0F108124FA009B590CA75DC52D7A0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 000D4A08
                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 000D4A5C
                                          • SetErrorMode.KERNEL32(00000000,?,?,000FCC08), ref: 000D4AD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume
                                          • String ID: %lu
                                          • API String ID: 2507767853-685833217
                                          • Opcode ID: dbbda1c45999342f89ba8323cfe52de691bd7e3ee3ed78872bf980246a9c5658
                                          • Instruction ID: 8732ee7fd3d9548067f7669b563d8d7c9502e2ca638c23c119eaafbd76cbadd8
                                          • Opcode Fuzzy Hash: dbbda1c45999342f89ba8323cfe52de691bd7e3ee3ed78872bf980246a9c5658
                                          • Instruction Fuzzy Hash: DE318E74A00208AFDB10DF58C981EAA7BF8EF08318F1480A9E909DB352D775ED45CB61
                                          APIs
                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 000F424F
                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 000F4264
                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 000F4271
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: msctls_trackbar32
                                          • API String ID: 3850602802-1010561917
                                          • Opcode ID: 758bc2d5fb0588a59c1aa67de7ae17ceea5f2a0f6c11a3f9698d467ead309048
                                          • Instruction ID: e0d465105959eb17129c094f703ce5ba2362d9df5a92fb55d61c78e13ca11247
                                          • Opcode Fuzzy Hash: 758bc2d5fb0588a59c1aa67de7ae17ceea5f2a0f6c11a3f9698d467ead309048
                                          • Instruction Fuzzy Hash: 1111E031240248BEEF609E28CC06FBB3BACEF85B64F010524FA55E20A0D271D861EB20
                                          APIs
                                            • Part of subcall function 00066B57: _wcslen.LIBCMT ref: 00066B6A
                                            • Part of subcall function 000C2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 000C2DC5
                                            • Part of subcall function 000C2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 000C2DD6
                                            • Part of subcall function 000C2DA7: GetCurrentThreadId.KERNEL32 ref: 000C2DDD
                                            • Part of subcall function 000C2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 000C2DE4
                                          • GetFocus.USER32 ref: 000C2F78
                                            • Part of subcall function 000C2DEE: GetParent.USER32(00000000), ref: 000C2DF9
                                          • GetClassNameW.USER32(?,?,00000100), ref: 000C2FC3
                                          • EnumChildWindows.USER32(?,000C303B), ref: 000C2FEB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                          • String ID: %s%d
                                          • API String ID: 1272988791-1110647743
                                          • Opcode ID: 2b9cc84d0246f46da6ac23a305f0ff5c4f0623dfbf772268d2ba3a52fac136cd
                                          • Instruction ID: b2f8b52e5f98dce6574c5310bcab0abb6be63a99be6e99dc947af71e4729ed3d
                                          • Opcode Fuzzy Hash: 2b9cc84d0246f46da6ac23a305f0ff5c4f0623dfbf772268d2ba3a52fac136cd
                                          • Instruction Fuzzy Hash: 5B11CD71600209ABDF506F608C96FFE37AAAF94304F048079B90A9B293DF7199499B60
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 000F58C1
                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 000F58EE
                                          • DrawMenuBar.USER32(?), ref: 000F58FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Menu$InfoItem$Draw
                                          • String ID: 0
                                          • API String ID: 3227129158-4108050209
                                          • Opcode ID: 81b4ccafd09c045a67d53433c4e4a68360a48b827ae19810957f580370a116fe
                                          • Instruction ID: 9d6b0af7f5daf83b544458d51c35f8e74dbf49ec4a06040fb03ad2619842479b
                                          • Opcode Fuzzy Hash: 81b4ccafd09c045a67d53433c4e4a68360a48b827ae19810957f580370a116fe
                                          • Instruction Fuzzy Hash: 04018B3150420CEEEB209F21DC45BBEBBB4FF45761F108099EA49D6151DB748A84EF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 183aa159bfd74454067de64fab475f10bf3b4d06a3145d7d4a01c5c64a31c619
                                          • Instruction ID: d4020519ceb9ae81e96405499d23a37b0f3188700ac47d1b6426346a8a377f61
                                          • Opcode Fuzzy Hash: 183aa159bfd74454067de64fab475f10bf3b4d06a3145d7d4a01c5c64a31c619
                                          • Instruction Fuzzy Hash: A6C11875A0021AEFDB14CFA4C898FAEB7B9FF48704F148598E905AB251D731EE41DB90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInitInitializeUninitialize
                                          • String ID:
                                          • API String ID: 1998397398-0
                                          • Opcode ID: 451bbed09278d90886feec946b324b46a2595f647647a99c4b49ec272fa09df9
                                          • Instruction ID: a8d704dae2fdb23a059d6d49bbd485e557b3f2e5942790bfdc02a7df3fbcce1b
                                          • Opcode Fuzzy Hash: 451bbed09278d90886feec946b324b46a2595f647647a99c4b49ec272fa09df9
                                          • Instruction Fuzzy Hash: 08A14A756047009FD710DF29C585A6ABBE5FF88714F04885DF98AAB362DB70EE01CB91
                                          APIs
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,000FFC08,?), ref: 000C05F0
                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,000FFC08,?), ref: 000C0608
                                          • CLSIDFromProgID.OLE32(?,?,00000000,000FCC40,000000FF,?,00000000,00000800,00000000,?,000FFC08,?), ref: 000C062D
                                          • _memcmp.LIBVCRUNTIME ref: 000C064E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FromProg$FreeTask_memcmp
                                          • String ID:
                                          • API String ID: 314563124-0
                                          • Opcode ID: 06091913bb53bfac1d3b60c682561eff0375fc2eb8218d3966a480a832f49eda
                                          • Instruction ID: 5d079f508465ed6ade8ccb2eb4c16dbbde831f29887556de2e223bfdc0d6334b
                                          • Opcode Fuzzy Hash: 06091913bb53bfac1d3b60c682561eff0375fc2eb8218d3966a480a832f49eda
                                          • Instruction Fuzzy Hash: 0781E975A00109EFDB04DF94C988EEEB7B9FF89315F204558E516AB250DB71AE06CF60
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 3b4896d4348299c287fa1b568695556f615b9e600b76f00ccebdc3e0bc00bcbe
                                          • Instruction ID: 0b7c4459f418ee28aa57345a0d3de22513fbbc55936e3530d49f7dc365ee3fcf
                                          • Opcode Fuzzy Hash: 3b4896d4348299c287fa1b568695556f615b9e600b76f00ccebdc3e0bc00bcbe
                                          • Instruction Fuzzy Hash: 1A412931A00615ABDF217BFD9C46AFE3AE4FF4B370F144225F429D6193E6348941A3A2
                                          APIs
                                          • GetWindowRect.USER32(00BDD7F0,?), ref: 000F62E2
                                          • ScreenToClient.USER32(?,?), ref: 000F6315
                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 000F6382
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ClientMoveRectScreen
                                          • String ID:
                                          • API String ID: 3880355969-0
                                          • Opcode ID: bdd1c7377dcac5262804f328ab06e95debd9375c2036d88c6e5b47982050ec0f
                                          • Instruction ID: 353b14168beec3ecb2a116c8c4019c29b766a99226312f33247300f94ae0c0c6
                                          • Opcode Fuzzy Hash: bdd1c7377dcac5262804f328ab06e95debd9375c2036d88c6e5b47982050ec0f
                                          • Instruction Fuzzy Hash: 2C515A70A00209EFDB50DF68D881ABE7BF6EF45360F108169FA159B691D731EE81EB50
                                          APIs
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 000E1AFD
                                          • WSAGetLastError.WSOCK32 ref: 000E1B0B
                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 000E1B8A
                                          • WSAGetLastError.WSOCK32 ref: 000E1B94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ErrorLast$socket
                                          • String ID:
                                          • API String ID: 1881357543-0
                                          • Opcode ID: d41db9f7e2240a06b1b319f80a0c7e7c022ee77930d8c967ab597349db3ffe30
                                          • Instruction ID: 6435c1f43ef6d4c52ce02446a44a143dc68630c8f3cd17e49fb6adfe1702095b
                                          • Opcode Fuzzy Hash: d41db9f7e2240a06b1b319f80a0c7e7c022ee77930d8c967ab597349db3ffe30
                                          • Instruction Fuzzy Hash: 6941D274600200AFE720AF24C886FAA77E6AB44718F54C498F91A9F7D3D776ED41CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8201f8d9a8b90b842949f516aa020364942e32d64ca92f328afd054840302ce4
                                          • Instruction ID: a2d127556653bf1a8474098895bc79cd885ddfb7c30193ee7d201afeca3b5fbc
                                          • Opcode Fuzzy Hash: 8201f8d9a8b90b842949f516aa020364942e32d64ca92f328afd054840302ce4
                                          • Instruction Fuzzy Hash: 28411675A00704BFDB24AF78DD41BEABBE9EF88720F10452AF151DB292D7719901A780
                                          APIs
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 000D5783
                                          • GetLastError.KERNEL32(?,00000000), ref: 000D57A9
                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 000D57CE
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 000D57FA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                          • String ID:
                                          • API String ID: 3321077145-0
                                          • Opcode ID: ce17f72a27e9e9c7aa0293491a2702d5cb2cfa49ac247a8c615fc51400ebcf54
                                          • Instruction ID: 485e123cc0b2ed146c76d1c978f3e83cf473c52181934cc92feef4b1adfcde1b
                                          • Opcode Fuzzy Hash: ce17f72a27e9e9c7aa0293491a2702d5cb2cfa49ac247a8c615fc51400ebcf54
                                          • Instruction Fuzzy Hash: AC415D35200A10DFCB10DF15C545A9EBBF2EF89325B188489EC4AAB362CB74FD41DB91
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00086D71,00000000,00000000,000882D9,?,000882D9,?,00000001,00086D71,8BE85006,00000001,000882D9,000882D9), ref: 0009D910
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0009D999
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0009D9AB
                                          • __freea.LIBCMT ref: 0009D9B4
                                            • Part of subcall function 00093820: RtlAllocateHeap.NTDLL(00000000,?,00131444,?,0007FDF5,?,?,0006A976,00000010,00131440,000613FC,?,000613C6,?,00061129), ref: 00093852
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID:
                                          • API String ID: 2652629310-0
                                          • Opcode ID: 64c35d06ac2971e9191bdd5549b28e74757b328792ea59387c5db77a0ca96799
                                          • Instruction ID: 0590f00c1e12ea2192ac1d467adc1205d85714ed5de678010c029359f292f46c
                                          • Opcode Fuzzy Hash: 64c35d06ac2971e9191bdd5549b28e74757b328792ea59387c5db77a0ca96799
                                          • Instruction Fuzzy Hash: 2C31BE72A1020AABDF25EFA4DC41EEF7BA5EB41310B05416AFC04D7291EB39CD54EB90
                                          APIs
                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 000F5352
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F5375
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 000F5382
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 000F53A8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LongWindow$InvalidateMessageRectSend
                                          • String ID:
                                          • API String ID: 3340791633-0
                                          • Opcode ID: 78d55f6b28982bd2cb00f89f11533808fbd36e5e40681513dc1b6273b769ddab
                                          • Instruction ID: cd421295fbc9c44ddf130db45e402093195e1df272174427127e662ef3da161b
                                          • Opcode Fuzzy Hash: 78d55f6b28982bd2cb00f89f11533808fbd36e5e40681513dc1b6273b769ddab
                                          • Instruction Fuzzy Hash: 38319034A55A0CEFEB709A1CCC46FF877A6AB05392F584101FB51969E1C7B49B80FB42
                                          APIs
                                          • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 000CABF1
                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 000CAC0D
                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 000CAC74
                                          • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 000CACC6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: b13022a729c997bb1e96cd75694b81c75400c0b96f74c8b093e6cf18a8db1cb4
                                          • Instruction ID: 066645209a535889f62084748598e6b8cac56262b303e7acfb6f2c14d60f6389
                                          • Opcode Fuzzy Hash: b13022a729c997bb1e96cd75694b81c75400c0b96f74c8b093e6cf18a8db1cb4
                                          • Instruction Fuzzy Hash: 2F312630B4461C6FFF34CB688C89FFE7BE5AB8A328F04421EE485921D1C37889859752
                                          APIs
                                          • ClientToScreen.USER32(?,?), ref: 000F769A
                                          • GetWindowRect.USER32(?,?), ref: 000F7710
                                          • PtInRect.USER32(?,?,000F8B89), ref: 000F7720
                                          • MessageBeep.USER32(00000000), ref: 000F778C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Rect$BeepClientMessageScreenWindow
                                          • String ID:
                                          • API String ID: 1352109105-0
                                          • Opcode ID: 683a4535fd8d43a72f70f1cc8447123120188dae4d854ec8963142bc3914d7a4
                                          • Instruction ID: 246d6f3ee7008a1ce24cc11b0d53915dd5d0f212ba8fb7cd83fcf200e3bcd439
                                          • Opcode Fuzzy Hash: 683a4535fd8d43a72f70f1cc8447123120188dae4d854ec8963142bc3914d7a4
                                          • Instruction Fuzzy Hash: E5419E34609318EFDB11EF58C894EB977F5BB48304F1940A8E618DBA61C331E981EB92
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 000F16EB
                                            • Part of subcall function 000C3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 000C3A57
                                            • Part of subcall function 000C3A3D: GetCurrentThreadId.KERNEL32 ref: 000C3A5E
                                            • Part of subcall function 000C3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,000C25B3), ref: 000C3A65
                                          • GetCaretPos.USER32(?), ref: 000F16FF
                                          • ClientToScreen.USER32(00000000,?), ref: 000F174C
                                          • GetForegroundWindow.USER32 ref: 000F1752
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                          • String ID:
                                          • API String ID: 2759813231-0
                                          • Opcode ID: 938e12b8b57b62b066a75720c9023a44b3b94fe28696aab4f5cf33667e7c1094
                                          • Instruction ID: 7f14565ac3b46f7a262d5a64f986a6877e3fde34c3e0d0ab5fc1cfa6afb5a472
                                          • Opcode Fuzzy Hash: 938e12b8b57b62b066a75720c9023a44b3b94fe28696aab4f5cf33667e7c1094
                                          • Instruction Fuzzy Hash: DE315E75D04249EFD704EFA9C981CFEBBF9EF48304B5080AAE419E7612D6319E45CBA0
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 000CD501
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 000CD50F
                                          • Process32NextW.KERNEL32(00000000,?), ref: 000CD52F
                                          • CloseHandle.KERNEL32(00000000), ref: 000CD5DC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: 12204735b9315f1ba8cab5fdcb02aed531711bc4db6ce5a71c28bcf0ee2d7153
                                          • Instruction ID: 2b479dbbb824fcb10c06bb6c4fb000eff18093273e7167a05b647011b8814de2
                                          • Opcode Fuzzy Hash: 12204735b9315f1ba8cab5fdcb02aed531711bc4db6ce5a71c28bcf0ee2d7153
                                          • Instruction Fuzzy Hash: 963193711083009FE300EF54C881FAFBBE9EF99354F54052DF585971A2EB719944DBA2
                                          APIs
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          • GetCursorPos.USER32(?), ref: 000F9001
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,000B7711,?,?,?,?,?), ref: 000F9016
                                          • GetCursorPos.USER32(?), ref: 000F905E
                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,000B7711,?,?,?), ref: 000F9094
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                          • String ID:
                                          • API String ID: 2864067406-0
                                          • Opcode ID: cbf3a224a6599ddc066e82cbc3b3d3e1fbe70b8b8f9329b4006896fa524106ed
                                          • Instruction ID: 025636d2d4757b1985e8d82b5ca9b128c9896ea60414f6dde2eb79cb8df20037
                                          • Opcode Fuzzy Hash: cbf3a224a6599ddc066e82cbc3b3d3e1fbe70b8b8f9329b4006896fa524106ed
                                          • Instruction Fuzzy Hash: 72219C3560001CEFDB258FA4C859FFA3BB9EB89750F004065FA058B6A1CB359990EF60
                                          APIs
                                          • GetFileAttributesW.KERNEL32(?,000FCB68), ref: 000CD2FB
                                          • GetLastError.KERNEL32 ref: 000CD30A
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 000CD319
                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,000FCB68), ref: 000CD376
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                          • String ID:
                                          • API String ID: 2267087916-0
                                          • Opcode ID: 57ea83552eb0097d15d8c1adad66886a2d834d16f0b1e7e5d6acbae9b0fabea8
                                          • Instruction ID: 4d5fa2771a683b708141af27f8b7012050e76eba219dffd4de525676618ab53d
                                          • Opcode Fuzzy Hash: 57ea83552eb0097d15d8c1adad66886a2d834d16f0b1e7e5d6acbae9b0fabea8
                                          • Instruction Fuzzy Hash: 9F21A3705082059F9310DF24C981DAEB7E8EF55364F504A2EF499C72E2DB30DA45DB93
                                          APIs
                                            • Part of subcall function 000C1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 000C102A
                                            • Part of subcall function 000C1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 000C1036
                                            • Part of subcall function 000C1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 000C1045
                                            • Part of subcall function 000C1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 000C104C
                                            • Part of subcall function 000C1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 000C1062
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 000C15BE
                                          • _memcmp.LIBVCRUNTIME ref: 000C15E1
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000C1617
                                          • HeapFree.KERNEL32(00000000), ref: 000C161E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                          • String ID:
                                          • API String ID: 1592001646-0
                                          • Opcode ID: 438c006a79f550dde6fb18614a25eddf1d79dfe228987a2ef18f8b47bc114d13
                                          • Instruction ID: cd7210b67435f9dabe7d77ec36884ae7aaad31ea71b693ecc9512a6b496c1687
                                          • Opcode Fuzzy Hash: 438c006a79f550dde6fb18614a25eddf1d79dfe228987a2ef18f8b47bc114d13
                                          • Instruction Fuzzy Hash: 41214871E00109EFEB10DFA4CA49FEEB7F8EF46354F184459E441AB242E775AA05DBA0
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EC), ref: 000F280A
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 000F2824
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 000F2832
                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 000F2840
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Long$AttributesLayered
                                          • String ID:
                                          • API String ID: 2169480361-0
                                          • Opcode ID: aaeff8fc8144383a1b19f15a514ac8cb74add80fef8839be137d92b7e1656e0b
                                          • Instruction ID: b8384e38084ae1b907663cf89819c319ddef5b31a442f8bb247dd2fd894fca7b
                                          • Opcode Fuzzy Hash: aaeff8fc8144383a1b19f15a514ac8cb74add80fef8839be137d92b7e1656e0b
                                          • Instruction Fuzzy Hash: D8212131209619AFE710EB24C845FBA7B95AF45324F148158F526CBAE2CB75FC82D790
                                          APIs
                                            • Part of subcall function 000C8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,000C790A,?,000000FF,?,000C8754,00000000,?,0000001C,?,?), ref: 000C8D8C
                                            • Part of subcall function 000C8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 000C8DB2
                                            • Part of subcall function 000C8D7D: lstrcmpiW.KERNEL32(00000000,?,000C790A,?,000000FF,?,000C8754,00000000,?,0000001C,?,?), ref: 000C8DE3
                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,000C8754,00000000,?,0000001C,?,?,00000000), ref: 000C7923
                                          • lstrcpyW.KERNEL32(00000000,?), ref: 000C7949
                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,000C8754,00000000,?,0000001C,?,?,00000000), ref: 000C7984
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: lstrcmpilstrcpylstrlen
                                          • String ID: cdecl
                                          • API String ID: 4031866154-3896280584
                                          • Opcode ID: 80f7330e7582f577c2c7a67a3005536d521e469edd804ef4ce2af07e41fcf643
                                          • Instruction ID: fec5a52a7c5a57df42e43ce74e84fecbbffabf59b4f4d90f069fc2a2141dbcb8
                                          • Opcode Fuzzy Hash: 80f7330e7582f577c2c7a67a3005536d521e469edd804ef4ce2af07e41fcf643
                                          • Instruction Fuzzy Hash: C311293A200306ABDB155F34D845EBE77E5FF85350B10802EF94AC72A5EF319811DB65
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 000F7D0B
                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 000F7D2A
                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 000F7D42
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,000DB7AD,00000000), ref: 000F7D6B
                                            • Part of subcall function 00079BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00079BB2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID:
                                          • API String ID: 847901565-0
                                          • Opcode ID: 57d2f9660d900bdad7b48b83ef3da8aa911a651a42d4daa0f938d5979db47a0d
                                          • Instruction ID: 06a61b352cf693c0ce4f1fb47ec943b2e27d162cacd1355bd6a3291b3d8a3fa1
                                          • Opcode Fuzzy Hash: 57d2f9660d900bdad7b48b83ef3da8aa911a651a42d4daa0f938d5979db47a0d
                                          • Instruction Fuzzy Hash: D411DF31608619AFDB108F28CC04EBA3BA5AF45360B518328F939CBAF0D7308D51EB80
                                          APIs
                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 000F56BB
                                          • _wcslen.LIBCMT ref: 000F56CD
                                          • _wcslen.LIBCMT ref: 000F56D8
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 000F5816
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend_wcslen
                                          • String ID:
                                          • API String ID: 455545452-0
                                          • Opcode ID: e2d33541b65c3f2759450a2234b8c8365b8a23db7a9b7e91e1163e9ff5e5c138
                                          • Instruction ID: 76efe79dc68e5954a02d73bb10babcc6b27e23311700bebadca88b07ba1df0f5
                                          • Opcode Fuzzy Hash: e2d33541b65c3f2759450a2234b8c8365b8a23db7a9b7e91e1163e9ff5e5c138
                                          • Instruction Fuzzy Hash: B411B47160460DA6EF20DF618C85AFE77ACAF11766B104026FB55D6481EB709A80DB64
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c477750da540e70473b400932b5817262ebd2984d23d96bc9fc924667cf0b67a
                                          • Instruction ID: 2dcabe77b962c1c6e4e53f203913a8ed9ad9a41eb98f1e6cb1e2d80edbeff038
                                          • Opcode Fuzzy Hash: c477750da540e70473b400932b5817262ebd2984d23d96bc9fc924667cf0b67a
                                          • Instruction Fuzzy Hash: 92014FF230A61B7EFE6116786CC1FA7669DEF423B8B340325F535511D2DB648C40A160
                                          APIs
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 000C1A47
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 000C1A59
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 000C1A6F
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 000C1A8A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: fded0def5b43a2ee2dd33a436bde5fdc8d32da947d56e6f9ff457c2388462231
                                          • Instruction ID: 728bf0dfe9f87dfaf96dcb747a1f2d2299d4201a9b887d795b13543d8e519e6a
                                          • Opcode Fuzzy Hash: fded0def5b43a2ee2dd33a436bde5fdc8d32da947d56e6f9ff457c2388462231
                                          • Instruction Fuzzy Hash: F211393AD01219FFEB10DBA4CD85FEDBBB8EB08750F200095EA00B7291D6716E50DB94
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 000CE1FD
                                          • MessageBoxW.USER32(?,?,?,?), ref: 000CE230
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 000CE246
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 000CE24D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 2880819207-0
                                          • Opcode ID: da73e3d18990fe8d7a1ec4d205c567a57c5c415b5e8888392ae7ec1931af6057
                                          • Instruction ID: bd87296eb659e56a1c447a0405cc40da3bd0f4244a145f529f3934819e011b82
                                          • Opcode Fuzzy Hash: da73e3d18990fe8d7a1ec4d205c567a57c5c415b5e8888392ae7ec1931af6057
                                          • Instruction Fuzzy Hash: 0011D676904258BBE7019FA8EC0AFAE7FADFB45320F044259F924E3691D6B4CD0497A0
                                          APIs
                                          • CreateThread.KERNEL32(00000000,?,0008CFF9,00000000,00000004,00000000), ref: 0008D218
                                          • GetLastError.KERNEL32 ref: 0008D224
                                          • __dosmaperr.LIBCMT ref: 0008D22B
                                          • ResumeThread.KERNEL32(00000000), ref: 0008D249
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                          • String ID:
                                          • API String ID: 173952441-0
                                          • Opcode ID: bac218cf0b60bf5bd99123974dc2bf44842446920c7e8f585d2066d9276c319f
                                          • Instruction ID: 79d6b61163c4306a9c6b0e9122f5a1d4cd3d9c3d095f570cc5a057a810839caf
                                          • Opcode Fuzzy Hash: bac218cf0b60bf5bd99123974dc2bf44842446920c7e8f585d2066d9276c319f
                                          • Instruction Fuzzy Hash: DA01D6364051087BEB217BA5DC09BAE7B69FF91330F10031AF965961E1CF708901D7A0
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0006604C
                                          • GetStockObject.GDI32(00000011), ref: 00066060
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0006606A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CreateMessageObjectSendStockWindow
                                          • String ID:
                                          • API String ID: 3970641297-0
                                          • Opcode ID: b6c3e828eedff3abd7a326db1c54792256618d61fa38664815726fa127a15e36
                                          • Instruction ID: 52108ab8f098a88096858948a3d734fd4afb5a2e61d49e0ed7954db75d8e9538
                                          • Opcode Fuzzy Hash: b6c3e828eedff3abd7a326db1c54792256618d61fa38664815726fa127a15e36
                                          • Instruction Fuzzy Hash: 05115E72501548BFFF125F949C55EEBBFAAEF09354F040115FA1552110D736AC60EB90
                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00083B56
                                            • Part of subcall function 00083AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00083AD2
                                            • Part of subcall function 00083AA3: ___AdjustPointer.LIBCMT ref: 00083AED
                                          • _UnwindNestedFrames.LIBCMT ref: 00083B6B
                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00083B7C
                                          • CallCatchBlock.LIBVCRUNTIME ref: 00083BA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                          • String ID:
                                          • API String ID: 737400349-0
                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                          • Instruction ID: e31055cd89efe256cdb0a6b271610b75454170881dd18c048f0cd846bc2bfd0c
                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                          • Instruction Fuzzy Hash: BA01E972100149BBDF126E95CC46EEB7FA9FF98B54F044014FE8856122D736E961DBA0
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,000613C6,00000000,00000000,?,0009301A,000613C6,00000000,00000000,00000000,?,0009328B,00000006,FlsSetValue), ref: 000930A5
                                          • GetLastError.KERNEL32(?,0009301A,000613C6,00000000,00000000,00000000,?,0009328B,00000006,FlsSetValue,00102290,FlsSetValue,00000000,00000364,?,00092E46), ref: 000930B1
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0009301A,000613C6,00000000,00000000,00000000,?,0009328B,00000006,FlsSetValue,00102290,FlsSetValue,00000000), ref: 000930BF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: 3745ce1013317c132cc5610d444a90e25c77a651b911427d8b7c7be7fa64d3db
                                          • Instruction ID: 9008090a8927137f9d351455df659b0ae34128b53a54c4a870071ab2e2da9ac0
                                          • Opcode Fuzzy Hash: 3745ce1013317c132cc5610d444a90e25c77a651b911427d8b7c7be7fa64d3db
                                          • Instruction Fuzzy Hash: BC01F732301226ABEF714BB89C55E6B7BD8AF85BA1B110720F915E3580C725DD05DAE0
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 000C747F
                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 000C7497
                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 000C74AC
                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 000C74CA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Type$Register$FileLoadModuleNameUser
                                          • String ID:
                                          • API String ID: 1352324309-0
                                          • Opcode ID: 4010f524b550241eba698d9e775b7a3b53b22dcbb18f7faccb250e346c3fcea2
                                          • Instruction ID: 0a3e001ab54ab825b97c3d0664da73be374124208c398059ce09760776f3d4b5
                                          • Opcode Fuzzy Hash: 4010f524b550241eba698d9e775b7a3b53b22dcbb18f7faccb250e346c3fcea2
                                          • Instruction Fuzzy Hash: 1C118BB1205314ABF7308F54DD09FAABBFCEB00B00F10856DA62AD6591D7B4E904EF60
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,000CACD3,?,00008000), ref: 000CB0C4
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,000CACD3,?,00008000), ref: 000CB0E9
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,000CACD3,?,00008000), ref: 000CB0F3
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,000CACD3,?,00008000), ref: 000CB126
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CounterPerformanceQuerySleep
                                          • String ID:
                                          • API String ID: 2875609808-0
                                          • Opcode ID: 5459fd1f5e0fc1e5567abdf2069c1f7db6daaa7c477cb0e8e3a9342bf74bcbe5
                                          • Instruction ID: 80e779e469754a2f17a7c3aaf3a3bbfd9c893eb04449074dbd2e2369b2698791
                                          • Opcode Fuzzy Hash: 5459fd1f5e0fc1e5567abdf2069c1f7db6daaa7c477cb0e8e3a9342bf74bcbe5
                                          • Instruction Fuzzy Hash: F5112731C0152CEBDF10AFE4E95ABEEBB78BF4A711F504089D941B2181CB349A60DB52
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 000F7E33
                                          • ScreenToClient.USER32(?,?), ref: 000F7E4B
                                          • ScreenToClient.USER32(?,?), ref: 000F7E6F
                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000F7E8A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClientRectScreen$InvalidateWindow
                                          • String ID:
                                          • API String ID: 357397906-0
                                          • Opcode ID: 5ff0c3d259a1dadb3cd3fabfbe513dce4d49e088f65e3ebc4d8f26e84877ccb3
                                          • Instruction ID: 06d8548130eaab2c2adfa220328337298f961cf1bc6ce52f49659471708d69e3
                                          • Opcode Fuzzy Hash: 5ff0c3d259a1dadb3cd3fabfbe513dce4d49e088f65e3ebc4d8f26e84877ccb3
                                          • Instruction Fuzzy Hash: E81163B9D0420EAFEB41DF98C9859EEBBF5FB08310F104056E915E2610D734AA54DF50
                                          APIs
                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 000C2DC5
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 000C2DD6
                                          • GetCurrentThreadId.KERNEL32 ref: 000C2DDD
                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 000C2DE4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                          • String ID:
                                          • API String ID: 2710830443-0
                                          • Opcode ID: e0f9f6811d951c26235ad82775e9de87d6f3ca5e671b5f241462441ee3fd27d6
                                          • Instruction ID: 199666a3dfa32ced5b3f319220816c9bbf05514e21bf3617cf72fe6d353f530a
                                          • Opcode Fuzzy Hash: e0f9f6811d951c26235ad82775e9de87d6f3ca5e671b5f241462441ee3fd27d6
                                          • Instruction Fuzzy Hash: 96E06D711052287AF7201B629D0EFFB3E6CEF53BA1F000019B106D58809AA88840E6B0
                                          APIs
                                            • Part of subcall function 00079639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00079693
                                            • Part of subcall function 00079639: SelectObject.GDI32(?,00000000), ref: 000796A2
                                            • Part of subcall function 00079639: BeginPath.GDI32(?), ref: 000796B9
                                            • Part of subcall function 00079639: SelectObject.GDI32(?,00000000), ref: 000796E2
                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 000F8887
                                          • LineTo.GDI32(?,?,?), ref: 000F8894
                                          • EndPath.GDI32(?), ref: 000F88A4
                                          • StrokePath.GDI32(?), ref: 000F88B2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                          • String ID:
                                          • API String ID: 1539411459-0
                                          • Opcode ID: f9136e64d1ba1e53d2050ea4e776b1688c9f2d76004d2b2779b2be62ce988591
                                          • Instruction ID: 07108abfd8f07f957a29d45999836845b43e50c40dd1754b49a38bc33cdd194d
                                          • Opcode Fuzzy Hash: f9136e64d1ba1e53d2050ea4e776b1688c9f2d76004d2b2779b2be62ce988591
                                          • Instruction Fuzzy Hash: 83F03A36041259BAFB125F94AD0AFEA3E59AF06324F048100FA11654E2CB795562EBA9
                                          APIs
                                          • GetSysColor.USER32(00000008), ref: 000798CC
                                          • SetTextColor.GDI32(?,?), ref: 000798D6
                                          • SetBkMode.GDI32(?,00000001), ref: 000798E9
                                          • GetStockObject.GDI32(00000005), ref: 000798F1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Color$ModeObjectStockText
                                          • String ID:
                                          • API String ID: 4037423528-0
                                          • Opcode ID: c656cffdb44a4c9adc03ed510ad223b5976dec426b2d2aee1e7eb337e672ddb7
                                          • Instruction ID: 0748747fde288b3427b13bd425bebbdd57b12905d3737db65f67d52b8168d03f
                                          • Opcode Fuzzy Hash: c656cffdb44a4c9adc03ed510ad223b5976dec426b2d2aee1e7eb337e672ddb7
                                          • Instruction Fuzzy Hash: 83E06531244684AAFB215B78AD0AFF83F50FB52336F148219F7F9584E1C3754650EB10
                                          APIs
                                          • GetCurrentThread.KERNEL32 ref: 000C1634
                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,000C11D9), ref: 000C163B
                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,000C11D9), ref: 000C1648
                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,000C11D9), ref: 000C164F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CurrentOpenProcessThreadToken
                                          • String ID:
                                          • API String ID: 3974789173-0
                                          • Opcode ID: 8a66b6be528d8794dda0c51fddf6244b44ea7e552e6ce8db4f99879c18c6ec42
                                          • Instruction ID: cfe8f23fde04deb5a4af6251edcffac331981ede51b649e08835eb9f2a95d9db
                                          • Opcode Fuzzy Hash: 8a66b6be528d8794dda0c51fddf6244b44ea7e552e6ce8db4f99879c18c6ec42
                                          • Instruction Fuzzy Hash: ACE08632601215EBF7601FB09F0EFAA3BBDEF45791F144808F245C9080DA384445D750
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 000BD858
                                          • GetDC.USER32(00000000), ref: 000BD862
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 000BD882
                                          • ReleaseDC.USER32(?), ref: 000BD8A3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: f87c4b4370b6b6fcc4ca9bcff652fc027ccfb3e872ee6c1028c74daa67f85c81
                                          • Instruction ID: 54e1e506efc2ffaa7c84a279e26b9fd22f9c90fbdb39b937b82883785ba533ca
                                          • Opcode Fuzzy Hash: f87c4b4370b6b6fcc4ca9bcff652fc027ccfb3e872ee6c1028c74daa67f85c81
                                          • Instruction Fuzzy Hash: 4EE01AB0804208DFEB519FA0DA09E7DBBB2FB08311F248419E84AE7750CB3C4901EF40
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 000BD86C
                                          • GetDC.USER32(00000000), ref: 000BD876
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 000BD882
                                          • ReleaseDC.USER32(?), ref: 000BD8A3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: 9bbcedcd329e225d74b63b145a0f949ba2b88fec4bf9bd69fa95fd7f5cc761b2
                                          • Instruction ID: 3ee9698d2d938e046d96e27f0861a3c414458d456e0808765b38b0f9cdf150b5
                                          • Opcode Fuzzy Hash: 9bbcedcd329e225d74b63b145a0f949ba2b88fec4bf9bd69fa95fd7f5cc761b2
                                          • Instruction Fuzzy Hash: B0E012B0C04208EFEB50AFA0DA09A7DBBB2BB08310B148409E84AE7750CB3C5902EF40
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0006BEB3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: @$H
                                          • API String ID: 1385522511-3093124099
                                          • Opcode ID: d1251799565457ff7b96e2ccfc971768abecdb287a7db5422d76a32b5ba64161
                                          • Instruction ID: a04503cf6f9548aa93d42d8c2fe811361f917960ea3bf920eb31eb8aafd77881
                                          • Opcode Fuzzy Hash: d1251799565457ff7b96e2ccfc971768abecdb287a7db5422d76a32b5ba64161
                                          • Instruction Fuzzy Hash: 6A9119B5A0020ADFCB68DF59C0916AAB7F2FF58314F248169D945EB351E731EAC1CB90
                                          APIs
                                            • Part of subcall function 00067620: _wcslen.LIBCMT ref: 00067625
                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 000D4ED4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Connection_wcslen
                                          • String ID: *$LPT
                                          • API String ID: 1725874428-3443410124
                                          • Opcode ID: 085ea63aafcd2eaf9ccc0bd5cdd1dd4f963a69d6148ae51d1f623df53a38754c
                                          • Instruction ID: 4ed4f2414d6f926340514b971545c9471e34864ec354703aa4eae2569286234a
                                          • Opcode Fuzzy Hash: 085ea63aafcd2eaf9ccc0bd5cdd1dd4f963a69d6148ae51d1f623df53a38754c
                                          • Instruction Fuzzy Hash: 3B916175A003449FDB54DF54C484EAABBF1BF44304F1980AAE80A9F362D775ED85CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: 1a4bfbc11aa8d59e1682098c56c67faa77e83313311dde4eaea469c42b493f5b
                                          • Instruction ID: 9fc77ac493b03877191c90d9b8bde2ae9a11b5aced7ed4f8b61f83636301ab06
                                          • Opcode Fuzzy Hash: 1a4bfbc11aa8d59e1682098c56c67faa77e83313311dde4eaea469c42b493f5b
                                          • Instruction Fuzzy Hash: 66515535949286EFDB64DF68C0816FE7BE5EF19310F248095EC919B2D2DA349D43CB90
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 0007F2A2
                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0007F2BB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: GlobalMemorySleepStatus
                                          • String ID: @
                                          • API String ID: 2783356886-2766056989
                                          • Opcode ID: 04a2955e948f1e58bfb4218536956870a36dc28f72687359b69138687a1279e3
                                          • Instruction ID: 201a8f2ee72d3b233d63f730730478c766d63a727f5238e3234fabacea489db6
                                          • Opcode Fuzzy Hash: 04a2955e948f1e58bfb4218536956870a36dc28f72687359b69138687a1279e3
                                          • Instruction Fuzzy Hash: 8F517771418745ABE320AF50DC86BABBBF8FF84304F81885CF1D941096EB718569CB67
                                          APIs
                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 000E57E0
                                          • _wcslen.LIBCMT ref: 000E57EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper_wcslen
                                          • String ID: CALLARGARRAY
                                          • API String ID: 157775604-1150593374
                                          • Opcode ID: f49efb353ebaa98d332ea0403793ca2dc1616828bfd14c08f36eec86fcb18b7f
                                          • Instruction ID: 87324b7c01a7eb61b9b67b4003be60de71b96c1304d15c88c6d5bc868fa28255
                                          • Opcode Fuzzy Hash: f49efb353ebaa98d332ea0403793ca2dc1616828bfd14c08f36eec86fcb18b7f
                                          • Instruction Fuzzy Hash: 9741C031E001099FCB14DFA9C9819FEBBF5EF59315F20412AE505B7252EB349D81CB90
                                          APIs
                                          • _wcslen.LIBCMT ref: 000DD130
                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 000DD13A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CrackInternet_wcslen
                                          • String ID: |
                                          • API String ID: 596671847-2343686810
                                          • Opcode ID: 2358d5b8ca593b45d6c9f12db12896ac7d541ac16ac92761b37b1dced29d2cbb
                                          • Instruction ID: 33e67c62895ca13aa0b573f7fd369b7dec2cadaa91aec706bd2de43690900894
                                          • Opcode Fuzzy Hash: 2358d5b8ca593b45d6c9f12db12896ac7d541ac16ac92761b37b1dced29d2cbb
                                          • Instruction Fuzzy Hash: B3313075D00209ABCF15EFA4CC45AEE7FBAFF04300F00011AF815A6262D732AA05DB60
                                          APIs
                                          • DestroyWindow.USER32(?,?,?,?), ref: 000F3621
                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 000F365C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$DestroyMove
                                          • String ID: static
                                          • API String ID: 2139405536-2160076837
                                          • Opcode ID: 970b04c8e0f5e3002504ebfb991986091eabb8f0f37968e1aff8ad286d8afa92
                                          • Instruction ID: 2f2b6937a715905c3ff85d954f117503dc27e73a7b33cbe4f8578eefc381a3cc
                                          • Opcode Fuzzy Hash: 970b04c8e0f5e3002504ebfb991986091eabb8f0f37968e1aff8ad286d8afa92
                                          • Instruction Fuzzy Hash: 76318F71100608AAEB109F68DC41EFB73A9FF88724F008619FAA5D7291DA35ED81E760
                                          APIs
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 000F461F
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 000F4634
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: '
                                          • API String ID: 3850602802-1997036262
                                          • Opcode ID: f001bd73cbf22a0cf70eb6c4691de4f6570f049d9a17cf169148c7e417d57e94
                                          • Instruction ID: 928c367476d4968485653368bfd8538fb22c43f7c9c7d5049953991452a34b51
                                          • Opcode Fuzzy Hash: f001bd73cbf22a0cf70eb6c4691de4f6570f049d9a17cf169148c7e417d57e94
                                          • Instruction Fuzzy Hash: 06311674A00609AFDB14DFA9C980BEA7BB5FF09700F10406AEE04EB752D771A941DF90
                                          APIs
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 000F327C
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 000F3287
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Combobox
                                          • API String ID: 3850602802-2096851135
                                          • Opcode ID: 6a7ce64e5950235d6bc3257cf2fa726387781c339a59c0148172775054d6e019
                                          • Instruction ID: d428d4889b4b13a395ffd8dae390cb1cead186eea74f00e5ee8c6874a72678b3
                                          • Opcode Fuzzy Hash: 6a7ce64e5950235d6bc3257cf2fa726387781c339a59c0148172775054d6e019
                                          • Instruction Fuzzy Hash: 5911B27130020C7FFFA59E54DC81EFB37AAEB94364F104125FA1897691D6319D51A760
                                          APIs
                                            • Part of subcall function 0006600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0006604C
                                            • Part of subcall function 0006600E: GetStockObject.GDI32(00000011), ref: 00066060
                                            • Part of subcall function 0006600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0006606A
                                          • GetWindowRect.USER32(00000000,?), ref: 000F377A
                                          • GetSysColor.USER32(00000012), ref: 000F3794
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                          • String ID: static
                                          • API String ID: 1983116058-2160076837
                                          • Opcode ID: 83cb478c9994585473b12ee3b7559dc527dc5a300d077153601bd96da90cb1c1
                                          • Instruction ID: c1dfa06a7f1ba0c1b52f10b459be98e2f10057a4547d70bddb670b5787f403dc
                                          • Opcode Fuzzy Hash: 83cb478c9994585473b12ee3b7559dc527dc5a300d077153601bd96da90cb1c1
                                          • Instruction Fuzzy Hash: AF1117B2610209AFEB10EFA8CC46EFA7BF8FB08314F004914FA55E2250D735E851EB50
                                          APIs
                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 000DCD7D
                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 000DCDA6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Internet$OpenOption
                                          • String ID: <local>
                                          • API String ID: 942729171-4266983199
                                          • Opcode ID: 12731f44a2321fd7971b5a29a98c89c5a32c666240588c9dc32de052399c70d0
                                          • Instruction ID: 429ae612851e2165cb56cc926b456d6059cf88dc599d3ba57896d91b92400862
                                          • Opcode Fuzzy Hash: 12731f44a2321fd7971b5a29a98c89c5a32c666240588c9dc32de052399c70d0
                                          • Instruction Fuzzy Hash: 7611C6712057367AF7784B668C45EF7BEAEEF127A4F004227B10983280D7749840D6F0
                                          APIs
                                          • GetWindowTextLengthW.USER32(00000000), ref: 000F34AB
                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 000F34BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LengthMessageSendTextWindow
                                          • String ID: edit
                                          • API String ID: 2978978980-2167791130
                                          • Opcode ID: 201ff010e1d4442fa63e05ec665acbf196939186abc040a2f10ee90148d4aba7
                                          • Instruction ID: 2ffffff9496e0ad684f559b5b7c6d492b907a99b9f49c148ea2767e777c3ef34
                                          • Opcode Fuzzy Hash: 201ff010e1d4442fa63e05ec665acbf196939186abc040a2f10ee90148d4aba7
                                          • Instruction Fuzzy Hash: CC116A7110020CAAEB628E64DC45AFB37AAEB05774F504724FA61979E0C775FC91AB60
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                          • CharUpperBuffW.USER32(?,?,?), ref: 000C6CB6
                                          • _wcslen.LIBCMT ref: 000C6CC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: STOP
                                          • API String ID: 1256254125-2411985666
                                          • Opcode ID: 1a42f93ae4a18cea56b0b7aaebb13a022d3524e771618fa5f5c262737d7424c1
                                          • Instruction ID: 857d7b209789e51953a950707de9b8397feafd5840364b9a260b36cbf0af6e3d
                                          • Opcode Fuzzy Hash: 1a42f93ae4a18cea56b0b7aaebb13a022d3524e771618fa5f5c262737d7424c1
                                          • Instruction Fuzzy Hash: DA01C032A005268BCB30AFFDDD81EBF77EAEB61720B50052CE86297195EB33D900C650
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 000C3CCA
                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 000C1D4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 7956a0ff3489a3174ee9d5c9e4b6a510f75ceaf60f4a4e2c66714c601848cc03
                                          • Instruction ID: 5798400ad5a7969e1328015505db5b1a9fbf588539b5543e4de77c980e00cfbe
                                          • Opcode Fuzzy Hash: 7956a0ff3489a3174ee9d5c9e4b6a510f75ceaf60f4a4e2c66714c601848cc03
                                          • Instruction Fuzzy Hash: AC01D871601218ABCB14EBA4CD51EFE73A9EB57360B14091DF823572C3EA309918D760
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 000C3CCA
                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 000C1C46
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 7d207553ccd11ce1ed9226920c91153e6ee91f8a7e97e8514d4c71abc6c2bb61
                                          • Instruction ID: 681bae89dfeca2ce6dbe465ab1b9d297e73d872b563c02206ad86f8dbb992f79
                                          • Opcode Fuzzy Hash: 7d207553ccd11ce1ed9226920c91153e6ee91f8a7e97e8514d4c71abc6c2bb61
                                          • Instruction Fuzzy Hash: 2901A7756811086BDB14EB90CA92FFF77EE9B12340F14001DB41667683EA349E18E7B1
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 000C3CCA
                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 000C1CC8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 8f452c1a09694aa727b1fc9e1b9a48e38e0447394ca3528252842c54a145c4c3
                                          • Instruction ID: 0d4eca5e398029f7a34ccbbe27d5b1727a447d2901111547bc1afd32e8256f0d
                                          • Opcode Fuzzy Hash: 8f452c1a09694aa727b1fc9e1b9a48e38e0447394ca3528252842c54a145c4c3
                                          • Instruction Fuzzy Hash: 9701D6716801186BDB14FBA0DB92FFE73ED9B12340F540029B802B3683EA309F18D671
                                          APIs
                                            • Part of subcall function 00069CB3: _wcslen.LIBCMT ref: 00069CBD
                                            • Part of subcall function 000C3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 000C3CCA
                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 000C1DD3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 61fb6b1e0d78348e00a84c09acd51f74896eeb1a06bbe807ffb24f05d451890a
                                          • Instruction ID: 5bf6d0e6e03f2e829f4bcf131f15a1fdfa72a88ef27b7bee6bc2098d20a172ec
                                          • Opcode Fuzzy Hash: 61fb6b1e0d78348e00a84c09acd51f74896eeb1a06bbe807ffb24f05d451890a
                                          • Instruction Fuzzy Hash: 76F0A471A512186BDB14F7A4DD92FFE77ADAB12350F440919B822A36C3DA7059189260
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: 3, 3, 16, 1
                                          • API String ID: 176396367-3042988571
                                          • Opcode ID: b565fe26ae41198ac76b42bd713a8837cd6e40fe3c26bea74980d5b07350427b
                                          • Instruction ID: 8d0bf6dd5bccb80d0e82d2415c3d47eb8c6c9f6c15127ad1e8bf99a27f99520e
                                          • Opcode Fuzzy Hash: b565fe26ae41198ac76b42bd713a8837cd6e40fe3c26bea74980d5b07350427b
                                          • Instruction Fuzzy Hash: 4DE02B42205261149271227BACC19BF56C9EFD9750710182BF9CDD22E7EB94CD9193A0
                                          APIs
                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 000C0B23
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: Message
                                          • String ID: AutoIt$Error allocating memory.
                                          • API String ID: 2030045667-4017498283
                                          • Opcode ID: aef6507383cb5d241f3d20cece0ef9d6d03f3b1f595493243b07aa8ec92c8248
                                          • Instruction ID: 3387ab10f000ab94d032b9997dafcb1df8523559312a2fb0ba61ecaa7824145f
                                          • Opcode Fuzzy Hash: aef6507383cb5d241f3d20cece0ef9d6d03f3b1f595493243b07aa8ec92c8248
                                          • Instruction Fuzzy Hash: EFE0D83128831D3AE21037547D03FD97A858F05B14F10442AF788958C38BE6289096ED
                                          APIs
                                            • Part of subcall function 0007F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00080D71,?,?,?,0006100A), ref: 0007F7CE
                                          • IsDebuggerPresent.KERNEL32(?,?,?,0006100A), ref: 00080D75
                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0006100A), ref: 00080D84
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00080D7F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 55579361-631824599
                                          • Opcode ID: ee37cae3e9330cc9562324a33fe05d66f6276ebf3148b1de264cfbfd04d3a039
                                          • Instruction ID: 4fb12da085004ee482f0a877fbacfac3341818266ea1e27add52d165f7743027
                                          • Opcode Fuzzy Hash: ee37cae3e9330cc9562324a33fe05d66f6276ebf3148b1de264cfbfd04d3a039
                                          • Instruction Fuzzy Hash: 1BE06D742003028BE3A0AFB8D5047A27BE4BF00744F04892DE486C6A52DBB9E448DBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: %.3d$X64
                                          • API String ID: 481472006-1077770165
                                          • Opcode ID: 06cb30541b42a1dbf4ce4230cd5aa37012dfde06a3884fbbe4d377ae44113f7a
                                          • Instruction ID: 7dfab4fbe80939475252e42edff810ce0aef6835ba2e9db03a094866812fa09c
                                          • Opcode Fuzzy Hash: 06cb30541b42a1dbf4ce4230cd5aa37012dfde06a3884fbbe4d377ae44113f7a
                                          • Instruction Fuzzy Hash: BCD01261C09159E9CBA097D0DC459FEF37CFB28301F508463F90A91040F728C908AB61
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 000F232C
                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 000F233F
                                            • Part of subcall function 000CE97B: Sleep.KERNEL32 ref: 000CE9F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 051c0228c68ddf86af2e2a4e4224fee90c0b0f00690a3b6d58ba4be496c97f2c
                                          • Instruction ID: 686102af924ec0d0d91d6723a24e3e4d16135dcd87d190c552f04cf29c61b715
                                          • Opcode Fuzzy Hash: 051c0228c68ddf86af2e2a4e4224fee90c0b0f00690a3b6d58ba4be496c97f2c
                                          • Instruction Fuzzy Hash: BBD01276394354B7F664B770ED0FFDA7A149B00B10F0049167745EA5D1C9F4A851CA54
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 000F236C
                                          • PostMessageW.USER32(00000000), ref: 000F2373
                                            • Part of subcall function 000CE97B: Sleep.KERNEL32 ref: 000CE9F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: afd904828f682fed2b99ed1f2f321a0661f3ffcffc7e6b9b491a01fd1311b419
                                          • Instruction ID: 20046037576fbb4a2ee798bd458a04cc0b660d101a9f63274855d78deabbfa44
                                          • Opcode Fuzzy Hash: afd904828f682fed2b99ed1f2f321a0661f3ffcffc7e6b9b491a01fd1311b419
                                          • Instruction Fuzzy Hash: EED022323C03107BF264B330EC0FFCA76149B00B00F0009167301EA0D0C9F4B800CA04
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0009BE93
                                          • GetLastError.KERNEL32 ref: 0009BEA1
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0009BEFC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2142184810.0000000000061000.00000020.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                          • Associated: 00000000.00000002.2142170500.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.00000000000FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142234839.0000000000122000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142269440.000000000012C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2142283610.0000000000134000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_60000_LisectAVT_2403002A_257.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: 6a705b7372f4154614d470628bf4fa2d4363a32d8fb6767160ed453e5d20ed37
                                          • Instruction ID: dcb463c177ec8af6f094379d07d4e47f8635bcf012cb16424d89f92b6bee6439
                                          • Opcode Fuzzy Hash: 6a705b7372f4154614d470628bf4fa2d4363a32d8fb6767160ed453e5d20ed37
                                          • Instruction Fuzzy Hash: 5341D43460420AEFDF319F64EE64ABABBE9EF42330F144169F959971A1DB308D00EB50