Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_107.exe

Overview

General Information

Sample name:LisectAVT_2403002A_107.exe
Analysis ID:1482518
MD5:36c9c8f8f6b3108ca50e3aed21e603cf
SHA1:3c15cfbe686a3f9295c282bb500c63decfc72e0e
SHA256:045af949637f23a5dcfcfb972a1cc9fd1d5e74b04c5a58b7439a66042c60b2fe
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
Sigma detected: Remcos
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_107.exe (PID: 7740 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe" MD5: 36C9C8F8F6B3108CA50E3AED21E603CF)
    • parterres.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe" MD5: B23860489B1C2BACBB4B7382E8C4382D)
      • svchost.exe (PID: 2884 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • parterres.exe (PID: 6120 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: B23860489B1C2BACBB4B7382E8C4382D)
        • svchost.exe (PID: 7544 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
          • WerFault.exe (PID: 4700 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 796 MD5: C31336C1EFC2CCB44B4326EA793040F2)
          • WerFault.exe (PID: 3392 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 780 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • wscript.exe (PID: 6020 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • parterres.exe (PID: 764 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: B23860489B1C2BACBB4B7382E8C4382D)
      • svchost.exe (PID: 3260 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • parterres.exe (PID: 7056 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: B23860489B1C2BACBB4B7382E8C4382D)
        • svchost.exe (PID: 5952 cmdline: "C:\Users\user\AppData\Local\Esher\parterres.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "jnchina.ydns.eu:1177:1", "Assigned name": "jnchinacp", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-1632I1", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4a8:$a1: Remcos restarted by watchdog!
            • 0x6ca20:$a3: %02i:%02i:%02i:%03i
            Click to see the 49 entries
            SourceRuleDescriptionAuthorStrings
            10.2.svchost.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              10.2.svchost.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                10.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6c4a8:$a1: Remcos restarted by watchdog!
                • 0x6ca20:$a3: %02i:%02i:%02i:%03i
                10.2.svchost.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
                • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x6656c:$str_b2: Executing file:
                • 0x675ec:$str_b3: GetDirectListeningPort
                • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x67118:$str_b7: \update.vbs
                • 0x66594:$str_b9: Downloaded file:
                • 0x66580:$str_b10: Downloading file:
                • 0x66624:$str_b12: Failed to upload file:
                • 0x675b4:$str_b13: StartForward
                • 0x675d4:$str_b14: StopForward
                • 0x67070:$str_b15: fso.DeleteFile "
                • 0x67004:$str_b16: On Error Resume Next
                • 0x670a0:$str_b17: fso.DeleteFolder "
                • 0x66614:$str_b18: Uploaded file:
                • 0x665d4:$str_b19: Unable to delete:
                • 0x67038:$str_b20: while fso.FileExists("
                • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
                10.2.svchost.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x6637c:$s1: CoGetObject
                • 0x66390:$s1: CoGetObject
                • 0x663ac:$s1: CoGetObject
                • 0x70338:$s1: CoGetObject
                • 0x6633c:$s2: Elevation:Administrator!new:
                Click to see the 55 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , ProcessId: 6020, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", CommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", ParentImage: C:\Users\user\AppData\Local\Esher\parterres.exe, ParentProcessId: 7632, ParentProcessName: parterres.exe, ProcessCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", ProcessId: 2884, ProcessName: svchost.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs" , ProcessId: 6020, ProcessName: wscript.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", CommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", ParentImage: C:\Users\user\AppData\Local\Esher\parterres.exe, ParentProcessId: 7632, ParentProcessName: parterres.exe, ProcessCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe", ProcessId: 2884, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Esher\parterres.exe, ProcessId: 7632, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 7544, TargetFilename: C:\ProgramData\remcos\logs.dat
                No Snort rule has matched
                Timestamp:2024-07-26T00:12:33.419853+0200
                SID:2036594
                Source Port:54872
                Destination Port:1177
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-26T00:11:22.998837+0200
                SID:2036594
                Source Port:54863
                Destination Port:1177
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-26T00:11:48.627180+0200
                SID:2036594
                Source Port:54870
                Destination Port:1177
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-26T00:12:11.030776+0200
                SID:2036594
                Source Port:54871
                Destination Port:1177
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-26T00:09:43.221750+0200
                SID:2022930
                Source Port:443
                Destination Port:54860
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-26T00:08:38.257229+0200
                SID:2036594
                Source Port:54873
                Destination Port:1177
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-26T00:09:03.496192+0200
                SID:2022930
                Source Port:443
                Destination Port:49704
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: LisectAVT_2403002A_107.exeAvira: detected
                Source: jnchina.ydns.euAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAvira: detection malicious, Label: TR/Dropper.Gen
                Source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "jnchina.ydns.eu:1177:1", "Assigned name": "jnchinacp", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-1632I1", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888744040.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3889243632.0000000004D1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005894836.0000000004A1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: LisectAVT_2403002A_107.exeJoe Sandbox ML: detected
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,10_2_00433837
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,21_2_00433837
                Source: parterres.exe, 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_abaddaec-1

                Exploits

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004074FD _wcslen,CoGetObject,10_2_004074FD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004074FD _wcslen,CoGetObject,21_2_004074FD
                Source: LisectAVT_2403002A_107.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: parterres.exe, 00000007.00000003.2828898221.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000007.00000003.2829159618.0000000004340000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866439426.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866260044.0000000004350000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3010251855.0000000004390000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3009981630.0000000004530000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3043289576.0000000004490000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3047863280.0000000004380000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: parterres.exe, 00000007.00000003.2828898221.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000007.00000003.2829159618.0000000004340000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866439426.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866260044.0000000004350000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3010251855.0000000004390000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3009981630.0000000004530000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3043289576.0000000004490000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3047863280.0000000004380000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,9_2_004339B6
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_00452492
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00442886
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_004788BD
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,9_2_0045CAFA
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00431A86
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0044BD27
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0045DE8F FindFirstFileW,FindClose,9_2_0045DE8F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_0044BF8B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_00409253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041C291
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040C34D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_00409665
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0044E879 FindFirstFileExA,10_2_0044E879
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_0040880C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040783C FindFirstFileW,FindNextFileW,10_2_0040783C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00419AF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040BD37
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,21_2_00409253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,21_2_0041C291
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,21_2_0040C34D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,21_2_00409665
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0044E879 FindFirstFileExA,21_2_0044E879
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,21_2_0040880C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040783C FindFirstFileW,FindNextFileW,21_2_0040783C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,21_2_00419AF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,21_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,21_2_0040BD37
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00407C97

                Networking

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 23.106.121.133 1177Jump to behavior
                Source: Malware configuration extractorURLs: jnchina.ydns.eu
                Source: global trafficTCP traffic: 192.168.2.8:54863 -> 23.106.121.133:1177
                Source: Joe Sandbox ViewIP Address: 23.106.121.133 23.106.121.133
                Source: Joe Sandbox ViewASN Name: LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSG LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSG
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                Source: global trafficDNS traffic detected: DNS query: jnchina.ydns.eu
                Source: svchost.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: parterres.exe, 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, parterres.exe, 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,0000000010_2_0040A2B8
                Source: C:\Windows\SysWOW64\svchost.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\svchost.exeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\svchost.exeJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,9_2_0045A10F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_004168C1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,21_2_004168C1
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,9_2_0047C81C

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888744040.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3889243632.0000000004D1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005894836.0000000004A1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041C9E2 SystemParametersInfoW,10_2_0041C9E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0041C9E2 SystemParametersInfoW,21_2_0041C9E2

                System Summary

                barindex
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\SysWOW64\svchost.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,9_2_004333BE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,10_2_004167B4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,21_2_004167B4
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004096A00_2_004096A0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0042200C0_2_0042200C
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0041A2170_2_0041A217
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004122160_2_00412216
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0042435D0_2_0042435D
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004033C00_2_004033C0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044F4300_2_0044F430
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004125E80_2_004125E8
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044663B0_2_0044663B
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004138010_2_00413801
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0042096F0_2_0042096F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004129D00_2_004129D0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004119E30_2_004119E3
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040FA100_2_0040FA10
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00423C810_2_00423C81
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00411E780_2_00411E78
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00442E0C0_2_00442E0C
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00420EC00_2_00420EC0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044CF170_2_0044CF17
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00444FD20_2_00444FD2
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_017737A00_2_017737A0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 7_2_02E337A07_2_02E337A0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004096A09_2_004096A0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0042200C9_2_0042200C
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0041A2179_2_0041A217
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004122169_2_00412216
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0042435D9_2_0042435D
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004033C09_2_004033C0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044F4309_2_0044F430
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004125E89_2_004125E8
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044663B9_2_0044663B
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004138019_2_00413801
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0042096F9_2_0042096F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004129D09_2_004129D0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004119E39_2_004119E3
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0041C9AE9_2_0041C9AE
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0047EA6F9_2_0047EA6F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0040FA109_2_0040FA10
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044EB5F9_2_0044EB5F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00423C819_2_00423C81
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00411E789_2_00411E78
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00442E0C9_2_00442E0C
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00420EC09_2_00420EC0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044CF179_2_0044CF17
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00444FD29_2_00444FD2
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00A937A09_2_00A937A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043E0CC10_2_0043E0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041F0FA10_2_0041F0FA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0045415910_2_00454159
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043816810_2_00438168
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004461F010_2_004461F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043E2FB10_2_0043E2FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0045332B10_2_0045332B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0042739D10_2_0042739D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004374E610_2_004374E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043E55810_2_0043E558
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043877010_2_00438770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004378FE10_2_004378FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043394610_2_00433946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0044D9C910_2_0044D9C9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00427A4610_2_00427A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041DB6210_2_0041DB62
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00427BAF10_2_00427BAF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00437D3310_2_00437D33
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00435E5E10_2_00435E5E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00426E0E10_2_00426E0E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043DE9D10_2_0043DE9D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00413FCA10_2_00413FCA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00436FEA10_2_00436FEA
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 18_2_043037A018_2_043037A0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 20_2_02EB37A020_2_02EB37A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043E0CC21_2_0043E0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0041F0FA21_2_0041F0FA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0045415921_2_00454159
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043816821_2_00438168
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004461F021_2_004461F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043E2FB21_2_0043E2FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0045332B21_2_0045332B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0042739D21_2_0042739D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004374E621_2_004374E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043E55821_2_0043E558
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043877021_2_00438770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004378FE21_2_004378FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043394621_2_00433946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0044D9C921_2_0044D9C9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00427A4621_2_00427A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0041DB6221_2_0041DB62
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00427BAF21_2_00427BAF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00437D3321_2_00437D33
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00435E5E21_2_00435E5E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00426E0E21_2_00426E0E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043DE9D21_2_0043DE9D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00413FCA21_2_00413FCA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00436FEA21_2_00436FEA
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: String function: 004115D7 appears 36 times
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: String function: 00416C70 appears 39 times
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: String function: 00445AE0 appears 65 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00402213 appears 38 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004052FD appears 32 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434E10 appears 108 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040417E appears 46 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00402093 appears 100 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434770 appears 82 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401E65 appears 68 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401FAB appears 38 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00411F67 appears 32 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004020DF appears 40 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00457A28 appears 34 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004484CA appears 36 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004458D0 appears 56 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004046F7 appears 34 times
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: String function: 004115D7 appears 36 times
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: String function: 00416C70 appears 39 times
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: String function: 00445AE0 appears 65 times
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 796
                Source: LisectAVT_2403002A_107.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@20/24@1/1
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,9_2_004333BE
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,9_2_00464EAE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,10_2_00417952
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,21_2_00417952
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_0041AA4A
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeFile created: C:\Users\user\AppData\Local\EsherJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-1632I1
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7544
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeFile created: C:\Users\user\AppData\Local\Temp\autE247.tmpJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs"
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCommand line argument: Wu0_2_0040D6B0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCommand line argument: Wu9_2_0040D6B0
                Source: LisectAVT_2403002A_107.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_107.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 796
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 780
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: LisectAVT_2403002A_107.exeStatic file information: File size 1183502 > 1048576
                Source: Binary string: wntdll.pdbUGP source: parterres.exe, 00000007.00000003.2828898221.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000007.00000003.2829159618.0000000004340000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866439426.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866260044.0000000004350000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3010251855.0000000004390000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3009981630.0000000004530000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3043289576.0000000004490000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3047863280.0000000004380000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: parterres.exe, 00000007.00000003.2828898221.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000007.00000003.2829159618.0000000004340000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866439426.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000003.2866260044.0000000004350000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3010251855.0000000004390000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000012.00000003.3009981630.0000000004530000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3043289576.0000000004490000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000003.3047863280.0000000004380000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                Source: LisectAVT_2403002A_107.exeStatic PE information: real checksum: 0xa961f should be: 0x124b31
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00416CB5 push ecx; ret 9_2_00416CC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00457106 push ecx; ret 10_2_00457119
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0045B11A push esp; ret 10_2_0045B141
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0045E54D push esi; ret 10_2_0045E556
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00457A28 push eax; ret 10_2_00457A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00434E56 push ecx; ret 10_2_00434E69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00457106 push ecx; ret 21_2_00457119
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0045B11A push esp; ret 21_2_0045B141
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0045E54D push esi; ret 21_2_0045E556
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00457A28 push eax; ret 21_2_00457A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00434E56 push ecx; ret 21_2_00434E69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00406EB0 ShellExecuteW,URLDownloadToFileW,10_2_00406EB0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeFile created: C:\Users\user\AppData\Local\Esher\parterres.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_0041AA4A
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,9_2_0047A330
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,9_2_00434418
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041CB50
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040F7A7 Sleep,ExitProcess,10_2_0040F7A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040F7A7 Sleep,ExitProcess,21_2_0040F7A7
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI/Special instruction interceptor: Address: 2E333C4
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI/Special instruction interceptor: Address: A933C4
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI/Special instruction interceptor: Address: 43033C4
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI/Special instruction interceptor: Address: 2EB33C4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,10_2_0041A748
                Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,21_2_0041A748
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 987Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 8445Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: foregroundWindowGot 1734Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87045
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeAPI coverage: 3.8 %
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI coverage: 4.0 %
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7312Thread sleep count: 273 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7312Thread sleep time: -136500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7332Thread sleep count: 987 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7332Thread sleep time: -2961000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7332Thread sleep count: 8445 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7332Thread sleep time: -25335000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,9_2_004339B6
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_00452492
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00442886
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_004788BD
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,9_2_0045CAFA
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00431A86
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0044BD27
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0045DE8F FindFirstFileW,FindClose,9_2_0045DE8F
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_0044BF8B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_00409253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,10_2_0041C291
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,10_2_0040C34D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,10_2_00409665
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0044E879 FindFirstFileExA,10_2_0044E879
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,10_2_0040880C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040783C FindFirstFileW,FindNextFileW,10_2_0040783C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00419AF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040BD37
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,21_2_00409253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,21_2_0041C291
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,21_2_0040C34D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,21_2_00409665
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0044E879 FindFirstFileExA,21_2_0044E879
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,21_2_0040880C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040783C FindFirstFileW,FindNextFileW,21_2_0040783C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,21_2_00419AF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,21_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,21_2_0040BD37
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00407C97
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                Source: Amcache.hve.13.drBinary or memory string: VMware
                Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.13.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: svchost.exe, 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.13.drBinary or memory string: vmci.sys
                Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
                Source: svchost.exe, 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
                Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.13.drBinary or memory string: VMware20,1
                Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeAPI call chain: ExitProcess graph end nodegraph_0-86729
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_01773630 mov eax, dword ptr fs:[00000030h]0_2_01773630
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_01773690 mov eax, dword ptr fs:[00000030h]0_2_01773690
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_01771ED0 mov eax, dword ptr fs:[00000030h]0_2_01771ED0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 7_2_02E31ED0 mov eax, dword ptr fs:[00000030h]7_2_02E31ED0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 7_2_02E33630 mov eax, dword ptr fs:[00000030h]7_2_02E33630
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 7_2_02E33690 mov eax, dword ptr fs:[00000030h]7_2_02E33690
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00A93690 mov eax, dword ptr fs:[00000030h]9_2_00A93690
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00A93630 mov eax, dword ptr fs:[00000030h]9_2_00A93630
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00A91ED0 mov eax, dword ptr fs:[00000030h]9_2_00A91ED0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004432B5 mov eax, dword ptr fs:[00000030h]10_2_004432B5
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 18_2_04303630 mov eax, dword ptr fs:[00000030h]18_2_04303630
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 18_2_04303690 mov eax, dword ptr fs:[00000030h]18_2_04303690
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 18_2_04301ED0 mov eax, dword ptr fs:[00000030h]18_2_04301ED0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 20_2_02EB1ED0 mov eax, dword ptr fs:[00000030h]20_2_02EB1ED0
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 20_2_02EB3630 mov eax, dword ptr fs:[00000030h]20_2_02EB3630
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 20_2_02EB3690 mov eax, dword ptr fs:[00000030h]20_2_02EB3690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004432B5 mov eax, dword ptr fs:[00000030h]21_2_004432B5
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0041F250 SetUnhandledExceptionFilter,9_2_0041F250
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0041A208
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00417DAA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_004349F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00434B47 SetUnhandledExceptionFilter,10_2_00434B47
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0043BB22
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00434FDC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_004349F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00434B47 SetUnhandledExceptionFilter,21_2_00434B47
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_0043BB22
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 21_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00434FDC

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 23.106.121.133 1177Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 83A008Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2DDA008Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe10_2_004120F7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe21_2_004120F7
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Esher\parterres.exe "C:\Users\user\AppData\Local\Esher\parterres.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Esher\parterres.exe"Jump to behavior
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                Source: svchost.exe, 0000000A.00000002.3005794647.0000000002E36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: LisectAVT_2403002A_107.exe, parterres.exeBinary or memory string: Shell_TrayWnd
                Source: svchost.exe, 00000015.00000002.3888988270.0000000003036000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerProgram ManagerI1\
                Source: svchost.exe, 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.3888988270.0000000003036000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI1\
                Source: LisectAVT_2403002A_107.exe, parterres.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: svchost.exe, 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3005747536.0000000002E31000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3005794647.0000000002E36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00434C52 cpuid 10_2_00434C52
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,10_2_00452036
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_004520C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,10_2_00452313
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,10_2_00448404
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_0045243C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,10_2_00452543
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_00452610
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,10_2_0040F8D1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,10_2_004488ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,10_2_00451CD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,10_2_00451F50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,10_2_00451F9B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,21_2_00452036
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,21_2_004520C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,21_2_00452313
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,21_2_00448404
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,21_2_0045243C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,21_2_00452543
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,21_2_00452610
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,21_2_0040F8D1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,21_2_004488ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,21_2_00451CD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,21_2_00451F50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,21_2_00451F9B
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888744040.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3889243632.0000000004D1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005894836.0000000004A1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data10_2_0040BA12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data21_2_0040BA12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\10_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db10_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\21_2_0040BB30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db21_2_0040BB30
                Source: parterres.exeBinary or memory string: WIN_XP
                Source: parterres.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                Source: parterres.exeBinary or memory string: WIN_XPe
                Source: parterres.exeBinary or memory string: WIN_VISTA
                Source: parterres.exeBinary or memory string: WIN_7
                Source: parterres.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-1632I1Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-1632I1Jump to behavior
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.parterres.exe.2fe0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.parterres.exe.42c0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.parterres.exe.4310000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.parterres.exe.42d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888744040.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3889243632.0000000004D1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3005894836.0000000004A1F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7632, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 6120, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: parterres.exe PID: 7056, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5952, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe10_2_0040569A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe21_2_0040569A
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                Source: C:\Users\user\Desktop\LisectAVT_2403002A_107.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,9_2_004652BE
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,9_2_00476619
                Source: C:\Users\user\AppData\Local\Esher\parterres.exeCode function: 9_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,9_2_0046CEF3
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                2
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                11
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                221
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol221
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                2
                Valid Accounts
                1
                Bypass User Account Control
                2
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Windows Service
                2
                Valid Accounts
                1
                DLL Side-Loading
                NTDS3
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchd2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                Bypass User Account Control
                LSA Secrets126
                System Information Discovery
                SSHKeylogging1
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Windows Service
                1
                Masquerading
                Cached Domain Credentials141
                Security Software Discovery
                VNCGUI Input Capture11
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items322
                Process Injection
                2
                Valid Accounts
                DCSync2
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
                Registry Run Keys / Startup Folder
                2
                Virtualization/Sandbox Evasion
                Proc Filesystem2
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow11
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron322
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482518 Sample: LisectAVT_2403002A_107.exe Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 48 jnchina.ydns.eu 2->48 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus detection for URL or domain 2->68 70 9 other signatures 2->70 10 LisectAVT_2403002A_107.exe 6 2->10         started        13 wscript.exe 1 2->13         started        signatures3 process4 file5 46 C:\Users\user\AppData\Local\...\parterres.exe, PE32 10->46 dropped 16 parterres.exe 3 10->16         started        84 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->84 20 parterres.exe 2 13->20         started        signatures6 process7 file8 42 C:\Users\user\AppData\...\parterres.vbs, data 16->42 dropped 52 Antivirus detection for dropped file 16->52 54 Drops VBS files to the startup folder 16->54 56 Switches to a custom stack to bypass stack traces 16->56 22 svchost.exe 16->22         started        25 parterres.exe 2 16->25         started        27 parterres.exe 2 20->27         started        29 svchost.exe 20->29         started        signatures9 process10 signatures11 72 Contains functionality to bypass UAC (CMSTPLUA) 22->72 74 Contains functionalty to change the wallpaper 22->74 76 Contains functionality to steal Chrome passwords or cookies 22->76 82 3 other signatures 22->82 78 Writes to foreign memory regions 25->78 80 Maps a DLL or memory area into another process 25->80 31 svchost.exe 3 2 25->31         started        36 svchost.exe 1 27->36         started        process12 dnsIp13 50 jnchina.ydns.eu 23.106.121.133, 1177, 54863, 54870 LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSG Singapore 31->50 44 C:\ProgramData\remcos\logs.dat, data 31->44 dropped 58 Detected Remcos RAT 31->58 60 Installs a global keyboard hook 31->60 38 WerFault.exe 20 16 31->38         started        40 WerFault.exe 3 16 31->40         started        62 System process connects to network (likely due to code injection or exploit) 36->62 file14 signatures15 process16

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                LisectAVT_2403002A_107.exe100%AviraTR/AD.Remcos.pjhbd
                LisectAVT_2403002A_107.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Esher\parterres.exe100%AviraTR/Dropper.Gen
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://upx.sf.net0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                jnchina.ydns.eu100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                jnchina.ydns.eu
                23.106.121.133
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  jnchina.ydns.eutrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpsvchost.exefalse
                  • URL Reputation: safe
                  unknown
                  http://upx.sf.netAmcache.hve.13.drfalse
                  • URL Reputation: safe
                  unknown
                  http://geoplugin.net/json.gp/Cparterres.exe, 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, parterres.exe, 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, parterres.exe, 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  23.106.121.133
                  jnchina.ydns.euSingapore
                  59253LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSGtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1482518
                  Start date and time:2024-07-26 00:07:46 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 48s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:22
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:LisectAVT_2403002A_107.exe
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.expl.evad.winEXE@20/24@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 65
                  • Number of non-executed functions: 301
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240s for sample files taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 52.168.117.173
                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: LisectAVT_2403002A_107.exe
                  TimeTypeDescription
                  00:11:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs
                  18:11:16API Interceptor2x Sleep call for process: WerFault.exe modified
                  18:11:58API Interceptor653709x Sleep call for process: svchost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  23.106.121.133CITIBANK EUROPE PLC. SWIFT TRANSFER (008) CMSWT24019000690.exeGet hashmaliciousRemcosBrowse
                    Swift copy of payment.exeGet hashmaliciousRemcosBrowse
                      Statement of Account for the month of febuary..exeGet hashmaliciousRemcosBrowse
                        Statement of Account for the month of febuary.exeGet hashmaliciousRemcosBrowse
                          Quotation Drawing Specification.exeGet hashmaliciousRemcosBrowse
                            BANCA TRANSILVANIA SWIFT TRANSFER (008) CMSWT24019000690.exeGet hashmaliciousRemcosBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              jnchina.ydns.euCITIBANK EUROPE PLC. SWIFT TRANSFER (008) CMSWT24019000690.exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              Swift copy of payment.exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              Statement of Account for the month of febuary..exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              Statement of Account for the month of febuary.exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              Quotation Drawing Specification.exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              BANCA TRANSILVANIA SWIFT TRANSFER (008) CMSWT24019000690.exeGet hashmaliciousRemcosBrowse
                              • 23.106.121.133
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSGJeouiaPf03mHSBH.exeGet hashmaliciousFormBookBrowse
                              • 172.96.191.69
                              hNX3ktCRra.elfGet hashmaliciousUnknownBrowse
                              • 209.58.162.116
                              PO_CW00402902400429.exeGet hashmaliciousFormBookBrowse
                              • 172.96.191.214
                              Inquiry files v2.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 172.96.191.69
                              nK1Y86mbzfbkwpB.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                              • 172.96.191.69
                              Your file name without extension goes here.exeGet hashmaliciousFormBookBrowse
                              • 209.58.164.109
                              HSBC Bank_Approvel Letter.exeGet hashmaliciousFormBookBrowse
                              • 209.58.164.109
                              https://103.150.10.45:8443/Get hashmaliciousUnknownBrowse
                              • 103.150.10.45
                              PHHOjspjmp.exeGet hashmaliciousCMSBruteBrowse
                              • 209.58.180.90
                              FEB-MAR SOA 2024.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.96.191.121
                              No context
                              No context
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.9342181860042779
                              Encrypted:false
                              SSDEEP:192:DL/gao1Juf0YrZkCrjkZrCBozuiF3Z24IO8KRz:DjgaKJuMYrZkCrjQzuiF3Y4IO8KR
                              MD5:45F75CE655B3C636041D4C7D65EE8757
                              SHA1:7F22F3E0F61D402ADF6FD934DBFD99801648CD06
                              SHA-256:B0B4415DEFB770F55076F4C03179EDC36976A285340E7C78B3CC0804D1712360
                              SHA-512:4A7A0ED16DCB3E0E6E41E2CD7372D5DCE82DDD3A90BC850FA202597A8A4248EFD29DB65DDE7C8894C7817BA57561A6B725497AA87A65A0EEA40238C94C045834
                              Malicious:false
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.9.0.7.0.2.1.7.4.0.5.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.9.0.7.1.3.8.9.2.7.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.7.7.7.b.3.a.7.-.1.f.b.f.-.4.0.4.3.-.b.9.e.2.-.4.a.3.9.3.a.0.4.d.f.3.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.9.3.f.6.a.8.e.-.a.1.4.2.-.4.6.6.d.-.8.6.7.4.-.7.f.6.a.b.c.b.7.0.4.b.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.8.-.0.0.0.1.-.0.0.1.4.-.4.d.6.c.-.7.f.8.c.d.f.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.3.1.9.6.f.4.5.b.2.6.9.a.6.1.4.a.3.9.2.6.e.f.c.0.3.2.f.c.9.d.7.5.0.1.7.f.2.7.e.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.9343105339385486
                              Encrypted:false
                              SSDEEP:192:IdBo1Jcj0qG2GMAjkZrCBozuiFmZ24IO8KR:wBKJcQqGPMAjQzuiFmY4IO8KR
                              MD5:B5DCF14CCFB5045160FC834549498E35
                              SHA1:470D6819EF06FCAB288BC31AD0F8000ADBFA1AF6
                              SHA-256:704547B605D81D799EFFCD4944C7EAF9D5F95F50DB4770C0EEC1A750786E1C77
                              SHA-512:03C417B5C6AF1B253E8BB79461B5615D701C55F34A31A660F10687AF2B0B550A746F2105091BC704A3269728475E323C5CB5645295FEBCFE8F947AB9CB877264
                              Malicious:false
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.9.0.7.7.0.0.6.9.9.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.9.0.7.7.3.3.5.1.0.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.e.c.9.d.4.6.-.0.e.c.a.-.4.4.3.4.-.b.6.d.1.-.9.5.b.3.3.a.c.7.5.4.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.4.c.c.7.9.a.b.-.7.3.1.c.-.4.a.4.0.-.8.d.0.9.-.f.1.c.5.a.1.7.c.7.6.e.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.8.-.0.0.0.1.-.0.0.1.4.-.4.d.6.c.-.7.f.8.c.d.f.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.3.1.9.6.f.4.5.b.2.6.9.a.6.1.4.a.3.9.2.6.e.f.c.0.3.2.f.c.9.d.7.5.0.1.7.f.2.7.e.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 22:11:11 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):80896
                              Entropy (8bit):1.8955334888533235
                              Encrypted:false
                              SSDEEP:384:i6CASYxfW5x4oNIPKt5kYfJhz/74bDzx40K:i6JxfW5x4oNk05FhzT4bD7
                              MD5:CB0A5C281C5ED1FF7D80FFF8C102ED14
                              SHA1:3252FECBE1099529EF970C5143D06312C5E6ECCC
                              SHA-256:4B8D3170D7B45161B6C614558C722A264B2AA2AAFAAE1FD27BCD92C353830CC1
                              SHA-512:36F609ED5D1FA9D797D8E1160456D837629946479EBFC3C0BD2EA5A8D395F7DD4CD77CEACAAEEDDCCE210B1E351A8619942EDB793FC714C69D6F1619A05CDB1D
                              Malicious:false
                              Reputation:low
                              Preview:MDMP..a..... .........f........................D................=..........T.......8...........T...........x...........................................................................................................eJ......T.......GenuineIntel............T.......x...{.f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6306
                              Entropy (8bit):3.7169463038281867
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJds6MhCMYpoEuZuprw89bulGqsfUgSam:R6lXJG6OCMYpoEuZmulGJfUgG
                              MD5:06A3125EE09BE8CC6D0D0F87B0CC5046
                              SHA1:525D3EF95D23C0BFF144E6857B89DF64F851F7A6
                              SHA-256:DB16420812737E0CDD2F69E5C7703AA873456B98CD2E7EB176E76BEA4AA7C36C
                              SHA-512:0EBEBC4179642F931C134F1EAC42226C860A483A928FD451BAE8FC5879C80AC7519DF5E82C6FC6F3959E37880A45B0BA024F925EA1CD89446395695D79E76AD5
                              Malicious:false
                              Reputation:low
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.4.<./.P.i.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4655
                              Entropy (8bit):4.452125995366875
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zs5Jg77aI9svWpW8VYYYm8M4JCMLFz+q8bp0D0id:uIjfLI7u+7VoJCCRD0id
                              MD5:2A970CF5D88C6FEC1C5C80D461646543
                              SHA1:6DF6DD7D50EEE4846124712AF90A330B9C04E3CD
                              SHA-256:9503CE38D8B75ABEA82580D48B739DA56F003A86BB8836BD56D1BA0F688F3068
                              SHA-512:4052EAFF90788C0FBA256A805E34A95555F21D405F42BA836CAF9F2DDB40FD9D082623B37FEEC272F5ADB350BBD0FE793DE965C35473F6D318A0DE521A460DB7
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427033" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 22:11:17 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):76412
                              Entropy (8bit):1.875396585204553
                              Encrypted:false
                              SSDEEP:384:g66CASYxWBW5ECDfIOYt5kYfJhz/74bD8ZE+ZuV7PA:N6JxiW5ECDfZ65FhzT4bDME+Zo7I
                              MD5:C9C95D4366329A6079BBC1C507B18500
                              SHA1:4096116128BA0D857CB04B470EF358E8ECC6F4F4
                              SHA-256:8DA251793811A0C482597394AA4D4A8ACB2365179AF7B272EBC8D72DA7E73FFB
                              SHA-512:270E6103968934B1CA08EACCB83B9549DD5A482B6EA89ADD5072FF919C138C577F5D7F1DB47EEDC66982A39BFA62CC91EE7A4775A0F90E04CD8E15F1A965C61A
                              Malicious:false
                              Preview:MDMP..a..... .........f........................D................=..........T.......8...........T...........(...T.......................................................................................................eJ......T.......GenuineIntel............T.......x...{.f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6306
                              Entropy (8bit):3.715349604561789
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJdA6xU4YpoAAbpDRC89bYlGqsf0Vom:R6lXJK6xU4YpoAW7YlGJfi
                              MD5:B176444C74801647AE6DCC6F8ACE7F10
                              SHA1:BAB27645E68AFDECDEA551ABC22D088CB251D00A
                              SHA-256:052FA7249C4C2B34BCEB37F83DD3B26B75F77C8D5AA01B6D9FAB2BC18DE369D8
                              SHA-512:269FCA73698674B82A552D52F441493F77108325D1A25863B9CEA33959566BD5DF6A99F1BAF2A5F88764DB6F4D99E77F200ECBA89C307438102381BA73FB2036
                              Malicious:false
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.4.<./.P.i.
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4655
                              Entropy (8bit):4.451200603316391
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zs5Jg77aI9svWpW8VYjYm8M4JCMpFD+q81p0D0id:uIjfLI7u+7VjJCcLD0id
                              MD5:099195EEE9FE2721A976A7B82EA44D63
                              SHA1:E2C0A247BFC54E953FB1EC305FCCFF1978B55397
                              SHA-256:DBCA5E100C192406B0E350E7E0B801932750022999C88063EA111DEB262CC388
                              SHA-512:0D58FA245EB54CC03440BA1DFC39E93231665E74E369D32F195975C27746D8B701E80A447720C2654AF6B9C542D08556919E210218741EFD6D28717BE7BC64B7
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427033" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\SysWOW64\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):204
                              Entropy (8bit):3.359740320613013
                              Encrypted:false
                              SSDEEP:3:rhlKlVgKfOlGlfU5JWRal2Jl+7R0DAlBG45klovDl64oojklovDl6v:6lVgKGl15YcIeeDAlOWA41gWAv
                              MD5:58B4708053D16EB0FE2B253057393FD7
                              SHA1:7CBC2943224A86E33CF9EAA3A482BCB36BF2A597
                              SHA-256:D0D9CA5375B90E4D1E9EF0696AB677C3862370D66F9B37F36F0D92B43D2F2393
                              SHA-512:FC7B9F79A7112379203F3C4477B644B707921F9C78CE605EB2B7FB9E4A07C7CCD04331AF9854C514E709543F3BC3D701FBD5E6716EFCF584905FBFD372AA1FF3
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                              Preview:....[.2.0.2.4./.0.7./.2.5. .1.8.:.1.1.:.0.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):116526862
                              Entropy (8bit):7.9997169829095744
                              Encrypted:true
                              SSDEEP:393216:YrNI1ZvQ//0t6mzsnlqM90R1vrWKQOfznZDaqYlEEb48Zc5kAyxeEICgxtxdgmi1:/gizOj1We7AXiuSjyhrL9zRNwz
                              MD5:B23860489B1C2BACBB4B7382E8C4382D
                              SHA1:B12FE6303E5C57A1F6777EF4E8CA557E0CDD68D8
                              SHA-256:335E29367D100276E463F53E0ED11221F16AC4C91E4C465B9034E45BBD39A6DD
                              SHA-512:B85A36D442B82356A0ED145A0BBE2882AD4A12F0CC48C74E788D67E199DA9A3272DD01C137FF3C7C5884BDF0E7F429737198DDC4FF8810FAB8AC97D3C392561A
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@...........................................@.......@.........................T.......x7........................................................................... ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...x7.......8...T..............@..@........................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):424082
                              Entropy (8bit):7.987385353236527
                              Encrypted:false
                              SSDEEP:6144:zNxdA3MZ1OWRvhwU2N8GebRQ4tF2qB8KUvNXyCouNadxmol1g5d4:zNxdAHWRvhGJiQ4ftJUFXXoJ3Tlu+
                              MD5:696C6F51928EAC19D8858C7D4D1679EB
                              SHA1:7C8A419E218B09A54F810B427D20A6ECD40989D2
                              SHA-256:398DD7147EFBE8F09F33B2343CB4EDF800D7174F675A41FA0A8F89353E556C80
                              SHA-512:0FDB245D0AFACF5AA09F1EE39CA4A06B7753F3CAC419F6B149F601FA8BDCD145A6BD583E64BB56CA2051E7B108322C9F9FE8159CA3AB5C1D13FA26BAD9365B5A
                              Malicious:false
                              Preview:EA06.....Dz4.EJ.F.R).}...S.L..Z]..K.V(...2.Y.T..y....tjUJ.H...T..C.r.L._.TVM"..&..<.k-.[&.Z.?..%.)T.Eh..m.....^..e.....|.L....[.....c..Y...NU}.X7.i..[g.s5...b]k..y.m.c...y....T.Z..).S...v...3.........S.9.m.o.....,....L...|...L;.k.....{?.......2.l....4uc..ip.}2...K....Mi4.-*.X.O...=j...v.T*u....v) ..2.D....:u..X..h..eH.w...J.B...:.D.....:....).z...$.*..m.U:......iv......0...#.B..c.o.b.N....L.*...9.".L.R.r>...]9....9.4.c.i.:kO.&.l.:uV.3.J..53.5.S+=..g4.R.3.p.g.....6.|.Y'.. q..2.4.Mh........B.4.].Y*......6}2..i..F....C.u,.W......e...&r...]X...h..U.2.>.O.@.d>..&w..*.(....=..52.......gN.....~.L..9..X.....Q.._.x...A..^!..4.X.I(.8.3c..Q.q...{..T...."./.I.5=e..6..1..TV.L.yj....;.S....6....!....Y..:..L....]..I%..1..&R............1.. 3=76.B.D.>....L...4...1.R.:..F....`..]gI..L......K.e...DW.&..fp..;....s....H.|.U.d+...^./....F.K@......;8..._.rd`.N...........9...&|... ...R...@....r.....f...G....9U.v2'....^;.2.$......M.._x\...........!.r.8..T...G...._....
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13122
                              Entropy (8bit):7.709220767249968
                              Encrypted:false
                              SSDEEP:192:1rgINinmYJJgJrzBU1CyWp7eQNkh9n3o8IoWH3OKFLKKGVXONSaRSuZI1UDRn:dgtm3JrmW7eQsnY8LK3tlGV+/Pdn
                              MD5:6620296DA7FFED70BFF93F6BB800F642
                              SHA1:1CB342E72DB06795DE36ED935F6451F3B872B371
                              SHA-256:C91C60503DACC15B01139B312D3EEF4AFE5BA1F1D91E1EC7E73273FE2E606FB1
                              SHA-512:56F25A3B6DA8334EE97A7B32AD6E8E6024B855AFB2DAA36E47A9FE45A5EF471F2ADF84EE04106FC7BA7F81AC923889237FA980BC0645BE52652A9E17F62C89F1
                              Malicious:false
                              Preview:EA06......e....[5....l.`."L&.....=........"k3......tM.......p............m0..f.........4.#.....a3.f..`.*N.%.@.....@...B......i@*.....Ufn...................K1.....k.....S3.....s...8.j....t......t.c......K...........@..8...&t...N@{15....'..[../...3P...(}..?...?S.....'.......<. .?...`/....@.?..M.......D..= ?.... ..h`........2....~p.. ..4..............s.L_.......S.......i.+.....W.......W/. ... WO.....@Wo. .s ...8..3.w....9/......k.`...v......^f.r?...S.....A5?0/.L@<...&.......x...M/... ....._..z..;.7.d..'....3..8.W..g....3/.8........L@.~.O..`....NA=.i.2w....L...9.._.7........O..'..U.d........2w.a.....&.\....v. ...l..3@V.....`S...=7....f!.....1.\.....2.F.........L..>)..w.2.a.&.3_..9..S....9.....fA...X.~&.+..X.d.A...p.....s.A.>P.&p......!.{..=...p2.@.2.W..N|....-...6..M.ku9./..={.......1.....w..+f...`..3......3N.':.Q..O~A...<.....w...I.......@v~.... ....... .....`V....`._.....v>.....2.9....2....2.`;?.].......O.....7.P...G@.....'.v....C ._.....I...o& ...#....4.8.f.'.x$.A........
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):424082
                              Entropy (8bit):7.987385353236527
                              Encrypted:false
                              SSDEEP:6144:zNxdA3MZ1OWRvhwU2N8GebRQ4tF2qB8KUvNXyCouNadxmol1g5d4:zNxdAHWRvhGJiQ4ftJUFXXoJ3Tlu+
                              MD5:696C6F51928EAC19D8858C7D4D1679EB
                              SHA1:7C8A419E218B09A54F810B427D20A6ECD40989D2
                              SHA-256:398DD7147EFBE8F09F33B2343CB4EDF800D7174F675A41FA0A8F89353E556C80
                              SHA-512:0FDB245D0AFACF5AA09F1EE39CA4A06B7753F3CAC419F6B149F601FA8BDCD145A6BD583E64BB56CA2051E7B108322C9F9FE8159CA3AB5C1D13FA26BAD9365B5A
                              Malicious:false
                              Preview:EA06.....Dz4.EJ.F.R).}...S.L..Z]..K.V(...2.Y.T..y....tjUJ.H...T..C.r.L._.TVM"..&..<.k-.[&.Z.?..%.)T.Eh..m.....^..e.....|.L....[.....c..Y...NU}.X7.i..[g.s5...b]k..y.m.c...y....T.Z..).S...v...3.........S.9.m.o.....,....L...|...L;.k.....{?.......2.l....4uc..ip.}2...K....Mi4.-*.X.O...=j...v.T*u....v) ..2.D....:u..X..h..eH.w...J.B...:.D.....:....).z...$.*..m.U:......iv......0...#.B..c.o.b.N....L.*...9.".L.R.r>...]9....9.4.c.i.:kO.&.l.:uV.3.J..53.5.S+=..g4.R.3.p.g.....6.|.Y'.. q..2.4.Mh........B.4.].Y*......6}2..i..F....C.u,.W......e...&r...]X...h..U.2.>.O.@.d>..&w..*.(....=..52.......gN.....~.L..9..X.....Q.._.x...A..^!..4.X.I(.8.3c..Q.q...{..T...."./.I.5=e..6..1..TV.L.yj....;.S....6....!....Y..:..L....]..I%..1..&R............1.. 3=76.B.D.>....L...4...1.R.:..F....`..]gI..L......K.e...DW.&..fp..;....s....H.|.U.d+...^./....F.K@......;8..._.rd`.N...........9...&|... ...R...@....r.....f...G....9U.v2'....^;.2.$......M.._x\...........!.r.8..T...G...._....
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13122
                              Entropy (8bit):7.709220767249968
                              Encrypted:false
                              SSDEEP:192:1rgINinmYJJgJrzBU1CyWp7eQNkh9n3o8IoWH3OKFLKKGVXONSaRSuZI1UDRn:dgtm3JrmW7eQsnY8LK3tlGV+/Pdn
                              MD5:6620296DA7FFED70BFF93F6BB800F642
                              SHA1:1CB342E72DB06795DE36ED935F6451F3B872B371
                              SHA-256:C91C60503DACC15B01139B312D3EEF4AFE5BA1F1D91E1EC7E73273FE2E606FB1
                              SHA-512:56F25A3B6DA8334EE97A7B32AD6E8E6024B855AFB2DAA36E47A9FE45A5EF471F2ADF84EE04106FC7BA7F81AC923889237FA980BC0645BE52652A9E17F62C89F1
                              Malicious:false
                              Preview:EA06......e....[5....l.`."L&.....=........"k3......tM.......p............m0..f.........4.#.....a3.f..`.*N.%.@.....@...B......i@*.....Ufn...................K1.....k.....S3.....s...8.j....t......t.c......K...........@..8...&t...N@{15....'..[../...3P...(}..?...?S.....'.......<. .?...`/....@.?..M.......D..= ?.... ..h`........2....~p.. ..4..............s.L_.......S.......i.+.....W.......W/. ... WO.....@Wo. .s ...8..3.w....9/......k.`...v......^f.r?...S.....A5?0/.L@<...&.......x...M/... ....._..z..;.7.d..'....3..8.W..g....3/.8........L@.~.O..`....NA=.i.2w....L...9.._.7........O..'..U.d........2w.a.....&.\....v. ...l..3@V.....`S...=7....f!.....1.\.....2.F.........L..>)..w.2.a.&.3_..9..S....9.....fA...X.~&.+..X.d.A...p.....s.A.>P.&p......!.{..=...p2.@.2.W..N|....-...6..M.ku9./..={.......1.....w..+f...`..3......3N.':.Q..O~A...<.....w...I.......@v~.... ....... .....`V....`._.....v>.....2.9....2....2.`;?.].......O.....7.P...G@.....'.v....C ._.....I...o& ...#....4.8.f.'.x$.A........
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):424082
                              Entropy (8bit):7.987385353236527
                              Encrypted:false
                              SSDEEP:6144:zNxdA3MZ1OWRvhwU2N8GebRQ4tF2qB8KUvNXyCouNadxmol1g5d4:zNxdAHWRvhGJiQ4ftJUFXXoJ3Tlu+
                              MD5:696C6F51928EAC19D8858C7D4D1679EB
                              SHA1:7C8A419E218B09A54F810B427D20A6ECD40989D2
                              SHA-256:398DD7147EFBE8F09F33B2343CB4EDF800D7174F675A41FA0A8F89353E556C80
                              SHA-512:0FDB245D0AFACF5AA09F1EE39CA4A06B7753F3CAC419F6B149F601FA8BDCD145A6BD583E64BB56CA2051E7B108322C9F9FE8159CA3AB5C1D13FA26BAD9365B5A
                              Malicious:false
                              Preview:EA06.....Dz4.EJ.F.R).}...S.L..Z]..K.V(...2.Y.T..y....tjUJ.H...T..C.r.L._.TVM"..&..<.k-.[&.Z.?..%.)T.Eh..m.....^..e.....|.L....[.....c..Y...NU}.X7.i..[g.s5...b]k..y.m.c...y....T.Z..).S...v...3.........S.9.m.o.....,....L...|...L;.k.....{?.......2.l....4uc..ip.}2...K....Mi4.-*.X.O...=j...v.T*u....v) ..2.D....:u..X..h..eH.w...J.B...:.D.....:....).z...$.*..m.U:......iv......0...#.B..c.o.b.N....L.*...9.".L.R.r>...]9....9.4.c.i.:kO.&.l.:uV.3.J..53.5.S+=..g4.R.3.p.g.....6.|.Y'.. q..2.4.Mh........B.4.].Y*......6}2..i..F....C.u,.W......e...&r...]X...h..U.2.>.O.@.d>..&w..*.(....=..52.......gN.....~.L..9..X.....Q.._.x...A..^!..4.X.I(.8.3c..Q.q...{..T...."./.I.5=e..6..1..TV.L.yj....;.S....6....!....Y..:..L....]..I%..1..&R............1.. 3=76.B.D.>....L...4...1.R.:..F....`..]gI..L......K.e...DW.&..fp..;....s....H.|.U.d+...^./....F.K@......;8..._.rd`.N...........9...&|... ...R...@....r.....f...G....9U.v2'....^;.2.$......M.._x\...........!.r.8..T...G...._....
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13122
                              Entropy (8bit):7.709220767249968
                              Encrypted:false
                              SSDEEP:192:1rgINinmYJJgJrzBU1CyWp7eQNkh9n3o8IoWH3OKFLKKGVXONSaRSuZI1UDRn:dgtm3JrmW7eQsnY8LK3tlGV+/Pdn
                              MD5:6620296DA7FFED70BFF93F6BB800F642
                              SHA1:1CB342E72DB06795DE36ED935F6451F3B872B371
                              SHA-256:C91C60503DACC15B01139B312D3EEF4AFE5BA1F1D91E1EC7E73273FE2E606FB1
                              SHA-512:56F25A3B6DA8334EE97A7B32AD6E8E6024B855AFB2DAA36E47A9FE45A5EF471F2ADF84EE04106FC7BA7F81AC923889237FA980BC0645BE52652A9E17F62C89F1
                              Malicious:false
                              Preview:EA06......e....[5....l.`."L&.....=........"k3......tM.......p............m0..f.........4.#.....a3.f..`.*N.%.@.....@...B......i@*.....Ufn...................K1.....k.....S3.....s...8.j....t......t.c......K...........@..8...&t...N@{15....'..[../...3P...(}..?...?S.....'.......<. .?...`/....@.?..M.......D..= ?.... ..h`........2....~p.. ..4..............s.L_.......S.......i.+.....W.......W/. ... WO.....@Wo. .s ...8..3.w....9/......k.`...v......^f.r?...S.....A5?0/.L@<...&.......x...M/... ....._..z..;.7.d..'....3..8.W..g....3/.8........L@.~.O..`....NA=.i.2w....L...9.._.7........O..'..U.d........2w.a.....&.\....v. ...l..3@V.....`S...=7....f!.....1.\.....2.F.........L..>)..w.2.a.&.3_..9..S....9.....fA...X.~&.+..X.d.A...p.....s.A.>P.&p......!.{..=...p2.@.2.W..N|....-...6..M.ku9./..={.......1.....w..+f...`..3......3N.':.Q..O~A...<.....w...I.......@v~.... ....... .....`V....`._.....v>.....2.9....2....2.`;?.].......O.....7.P...G@.....'.v....C ._.....I...o& ...#....4.8.f.'.x$.A........
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):424082
                              Entropy (8bit):7.987385353236527
                              Encrypted:false
                              SSDEEP:6144:zNxdA3MZ1OWRvhwU2N8GebRQ4tF2qB8KUvNXyCouNadxmol1g5d4:zNxdAHWRvhGJiQ4ftJUFXXoJ3Tlu+
                              MD5:696C6F51928EAC19D8858C7D4D1679EB
                              SHA1:7C8A419E218B09A54F810B427D20A6ECD40989D2
                              SHA-256:398DD7147EFBE8F09F33B2343CB4EDF800D7174F675A41FA0A8F89353E556C80
                              SHA-512:0FDB245D0AFACF5AA09F1EE39CA4A06B7753F3CAC419F6B149F601FA8BDCD145A6BD583E64BB56CA2051E7B108322C9F9FE8159CA3AB5C1D13FA26BAD9365B5A
                              Malicious:false
                              Preview:EA06.....Dz4.EJ.F.R).}...S.L..Z]..K.V(...2.Y.T..y....tjUJ.H...T..C.r.L._.TVM"..&..<.k-.[&.Z.?..%.)T.Eh..m.....^..e.....|.L....[.....c..Y...NU}.X7.i..[g.s5...b]k..y.m.c...y....T.Z..).S...v...3.........S.9.m.o.....,....L...|...L;.k.....{?.......2.l....4uc..ip.}2...K....Mi4.-*.X.O...=j...v.T*u....v) ..2.D....:u..X..h..eH.w...J.B...:.D.....:....).z...$.*..m.U:......iv......0...#.B..c.o.b.N....L.*...9.".L.R.r>...]9....9.4.c.i.:kO.&.l.:uV.3.J..53.5.S+=..g4.R.3.p.g.....6.|.Y'.. q..2.4.Mh........B.4.].Y*......6}2..i..F....C.u,.W......e...&r...]X...h..U.2.>.O.@.d>..&w..*.(....=..52.......gN.....~.L..9..X.....Q.._.x...A..^!..4.X.I(.8.3c..Q.q...{..T...."./.I.5=e..6..1..TV.L.yj....;.S....6....!....Y..:..L....]..I%..1..&R............1.. 3=76.B.D.>....L...4...1.R.:..F....`..]gI..L......K.e...DW.&..fp..;....s....H.|.U.d+...^./....F.K@......;8..._.rd`.N...........9...&|... ...R...@....r.....f...G....9U.v2'....^;.2.$......M.._x\...........!.r.8..T...G...._....
                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):424082
                              Entropy (8bit):7.987385353236527
                              Encrypted:false
                              SSDEEP:6144:zNxdA3MZ1OWRvhwU2N8GebRQ4tF2qB8KUvNXyCouNadxmol1g5d4:zNxdAHWRvhGJiQ4ftJUFXXoJ3Tlu+
                              MD5:696C6F51928EAC19D8858C7D4D1679EB
                              SHA1:7C8A419E218B09A54F810B427D20A6ECD40989D2
                              SHA-256:398DD7147EFBE8F09F33B2343CB4EDF800D7174F675A41FA0A8F89353E556C80
                              SHA-512:0FDB245D0AFACF5AA09F1EE39CA4A06B7753F3CAC419F6B149F601FA8BDCD145A6BD583E64BB56CA2051E7B108322C9F9FE8159CA3AB5C1D13FA26BAD9365B5A
                              Malicious:false
                              Preview:EA06.....Dz4.EJ.F.R).}...S.L..Z]..K.V(...2.Y.T..y....tjUJ.H...T..C.r.L._.TVM"..&..<.k-.[&.Z.?..%.)T.Eh..m.....^..e.....|.L....[.....c..Y...NU}.X7.i..[g.s5...b]k..y.m.c...y....T.Z..).S...v...3.........S.9.m.o.....,....L...|...L;.k.....{?.......2.l....4uc..ip.}2...K....Mi4.-*.X.O...=j...v.T*u....v) ..2.D....:u..X..h..eH.w...J.B...:.D.....:....).z...$.*..m.U:......iv......0...#.B..c.o.b.N....L.*...9.".L.R.r>...]9....9.4.c.i.:kO.&.l.:uV.3.J..53.5.S+=..g4.R.3.p.g.....6.|.Y'.. q..2.4.Mh........B.4.].Y*......6}2..i..F....C.u,.W......e...&r...]X...h..U.2.>.O.@.d>..&w..*.(....=..52.......gN.....~.L..9..X.....Q.._.x...A..^!..4.X.I(.8.3c..Q.q...{..T...."./.I.5=e..6..1..TV.L.yj....;.S....6....!....Y..:..L....]..I%..1..&R............1.. 3=76.B.D.>....L...4...1.R.:..F....`..]gI..L......K.e...DW.&..fp..;....s....H.|.U.d+...^./....F.K@......;8..._.rd`.N...........9...&|... ...R...@....r.....f...G....9U.v2'....^;.2.$......M.._x\...........!.r.8..T...G...._....
                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13122
                              Entropy (8bit):7.709220767249968
                              Encrypted:false
                              SSDEEP:192:1rgINinmYJJgJrzBU1CyWp7eQNkh9n3o8IoWH3OKFLKKGVXONSaRSuZI1UDRn:dgtm3JrmW7eQsnY8LK3tlGV+/Pdn
                              MD5:6620296DA7FFED70BFF93F6BB800F642
                              SHA1:1CB342E72DB06795DE36ED935F6451F3B872B371
                              SHA-256:C91C60503DACC15B01139B312D3EEF4AFE5BA1F1D91E1EC7E73273FE2E606FB1
                              SHA-512:56F25A3B6DA8334EE97A7B32AD6E8E6024B855AFB2DAA36E47A9FE45A5EF471F2ADF84EE04106FC7BA7F81AC923889237FA980BC0645BE52652A9E17F62C89F1
                              Malicious:false
                              Preview:EA06......e....[5....l.`."L&.....=........"k3......tM.......p............m0..f.........4.#.....a3.f..`.*N.%.@.....@...B......i@*.....Ufn...................K1.....k.....S3.....s...8.j....t......t.c......K...........@..8...&t...N@{15....'..[../...3P...(}..?...?S.....'.......<. .?...`/....@.?..M.......D..= ?.... ..h`........2....~p.. ..4..............s.L_.......S.......i.+.....W.......W/. ... WO.....@Wo. .s ...8..3.w....9/......k.`...v......^f.r?...S.....A5?0/.L@<...&.......x...M/... ....._..z..;.7.d..'....3..8.W..g....3/.8........L@.~.O..`....NA=.i.2w....L...9.._.7........O..'..U.d........2w.a.....&.\....v. ...l..3@V.....`S...=7....f!.....1.\.....2.F.........L..>)..w.2.a.&.3_..9..S....9.....fA...X.~&.+..X.d.A...p.....s.A.>P.&p......!.{..=...p2.@.2.W..N|....-...6..M.ku9./..={.......1.....w..+f...`..3......3N.':.Q..O~A...<.....w...I.......@v~.... ....... .....`V....`._.....v>.....2.9....2....2.`;?.].......O.....7.P...G@.....'.v....C ._.....I...o& ...#....4.8.f.'.x$.A........
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13122
                              Entropy (8bit):7.709220767249968
                              Encrypted:false
                              SSDEEP:192:1rgINinmYJJgJrzBU1CyWp7eQNkh9n3o8IoWH3OKFLKKGVXONSaRSuZI1UDRn:dgtm3JrmW7eQsnY8LK3tlGV+/Pdn
                              MD5:6620296DA7FFED70BFF93F6BB800F642
                              SHA1:1CB342E72DB06795DE36ED935F6451F3B872B371
                              SHA-256:C91C60503DACC15B01139B312D3EEF4AFE5BA1F1D91E1EC7E73273FE2E606FB1
                              SHA-512:56F25A3B6DA8334EE97A7B32AD6E8E6024B855AFB2DAA36E47A9FE45A5EF471F2ADF84EE04106FC7BA7F81AC923889237FA980BC0645BE52652A9E17F62C89F1
                              Malicious:false
                              Preview:EA06......e....[5....l.`."L&.....=........"k3......tM.......p............m0..f.........4.#.....a3.f..`.*N.%.@.....@...B......i@*.....Ufn...................K1.....k.....S3.....s...8.j....t......t.c......K...........@..8...&t...N@{15....'..[../...3P...(}..?...?S.....'.......<. .?...`/....@.?..M.......D..= ?.... ..h`........2....~p.. ..4..............s.L_.......S.......i.+.....W.......W/. ... WO.....@Wo. .s ...8..3.w....9/......k.`...v......^f.r?...S.....A5?0/.L@<...&.......x...M/... ....._..z..;.7.d..'....3..8.W..g....3/.8........L@.~.O..`....NA=.i.2w....L...9.._.7........O..'..U.d........2w.a.....&.\....v. ...l..3@V.....`S...=7....f!.....1.\.....2.F.........L..>)..w.2.a.&.3_..9..S....9.....fA...X.~&.+..X.d.A...p.....s.A.>P.&p......!.{..=...p2.@.2.W..N|....-...6..M.ku9./..={.......1.....w..+f...`..3......3N.':.Q..O~A...<.....w...I.......@v~.... ....... .....`V....`._.....v>.....2.9....2....2.`;?.].......O.....7.P...G@.....'.v....C ._.....I...o& ...#....4.8.f.'.x$.A........
                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              File Type:ASCII text, with very long lines (65536), with no line terminators
                              Category:dropped
                              Size (bytes):99082
                              Entropy (8bit):2.6588240400607095
                              Encrypted:false
                              SSDEEP:96:qpJWXTiFC6BPw7lUKs3anY2eKmVqric44o1lJqPQrCS2N1Bc2NZK2h5dY4YpYNPP:/XaJZi1sRe9gNVVcV
                              MD5:4C6854E2252F9E1867BD997DBB405750
                              SHA1:C2D860B569E23BC7921F5FBCCBB49A009BC9E75F
                              SHA-256:3693EAE59188288032F7FBBBAE72DDEA4E1C5DC20E5C66173B77702C2DEB90BD
                              SHA-512:E31EF37738912A0EB2A58134BBBFCE0631DB5383AF628EE9D9F031BD88DFC44F4B76917047454ADF796CC49C92865B266CCDA3CD40907B2492C9DF557F6E9E20
                              Malicious:false
                              Preview:51-123-56-56-59-101-104-102-59-52-104-102-102-102-51-53-51-51-51-51-56-57-56-58-101-59-57-101-51-51-51-51-51-51-57-57-59-60-55-56-59-55-101-60-57-56-51-51-51-51-51-51-57-57-59-60-55-103-59-57-101-100-58-53-51-51-51-51-51-51-57-57-59-60-56-56-59-59-101-59-57-104-51-51-51-51-51-51-57-57-59-60-55-56-59-100-101-60-57-56-51-51-51-51-51-51-57-57-59-60-55-103-59-102-101-100-57-102-51-51-51-51-51-51-57-57-59-60-56-56-59-104-101-59-54-54-51-51-51-51-51-51-57-57-59-60-55-56-60-51-101-60-54-53-51-51-51-51-51-51-57-57-59-60-55-103-60-53-101-100-53-104-51-51-51-51-51-51-57-57-59-60-56-56-60-55-101-59-57-55-51-51-51-51-51-51-57-57-59-60-55-56-60-57-101-60-57-102-51-51-51-51-51-51-57-57-59-60-55-103-60-59-101-100-57-102-51-51-51-51-51-51-57-57-59-60-56-56-60-100-54-54-102-51-57-57-59-60-55-56-60-102-101-60-57-104-51-51-51-51-51-51-57-57-59-60-59-103-55-55-105-105-105-105-105-105-101-100-58-55-51-51-51-51-51-51-57-57-59-60-60-56-55-57-105-105-105-105-105-105-101-59-57-55-51-51-51-51-51-51-57-57-59-60-
                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):494592
                              Entropy (8bit):7.599118186708923
                              Encrypted:false
                              SSDEEP:12288:5LH02VzIA86zIBDmje/QvyelaLo0xsupEVr0l7xeXzlQ:5T02VdIBDTeUDOup80Xmzm
                              MD5:996097488C81CDA3D1EB537BFF85FEBA
                              SHA1:37BD037979EA42B801F04583F8B211F4A7ED6F2A
                              SHA-256:A4DCB772EAA525F4F395D6B4384B4BC5CC761F710EDFEF4A255A20881B827961
                              SHA-512:6F37B8FDEE11ABD67065B4A7324974F41519D4E21D687E6B559DB50B606E3752AB099A7BC77D132A40366564836AB35598E1481C1FD2B4165EEE24A4EF100B0B
                              Malicious:false
                              Preview:x..NHRXFHHLG..LS.3N5KANK.XFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KAFJRXHS.BG.P.r.2..j.&"!x6>'+5-4l0%] Z?a,.r*3"h%)l...d^!Q.oCFX|FLHLGLY(...n.?n..&f..2.*}2`..0.-g0..8..k9r..-m..Kj..5..T2j..2..;...5..-B..6..&N..Mg..?w..&f..2Z..2...1q..0..r8m..9...,e.K.(-#r..2HLGLYLSDc.5K.OLR.T/-LGLYLSD3.5I@EJ\XF>MLGZ[LSD3N..BNKBXFL.IGLY.SD#N5KCNKWXGLHLGL\LRD3N5KAnCRXBLHLGLYNSD.N5[AN[RXFLXLG\YLSD3N%KANKRXFLHLG.JS@2N5K.IKn.FLHLGLYLSD3N5KANKRX.KH.|LY..B3v5KANKRXFLHLGLYLSD3N.GNSRXF4.JG.YLSD3N5KANKR.CL.HGLYLSD3N5KANKRXFLHLGLYLSD3`A.9:KRX3=MLG\YLS66N5OANKRXFLHLGLYLSd3NUe3**&9FL.5FLY.VD344KA8NRXFLHLGLYLSD3.5K.`/3,'LHL..YLST4N5EANK.^FLHLGLYLSD3N5.AN.|,*?HLGLPLSD3>2KALKRX.JHLGLYLSD3N5KA.KR.h+.%#?YLcF3N5.FNKVXFLHKGLYLSD3N5KANK.XF.f>4>:LSD..5KA.LRX.LHLCKYLSD3N5KANKRX.LH.i>< <'3N.pANK._FLtLGL.KSD3N5KANKRXFL.LG.YLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLGLYLSD3N5KANKRXFLHLG
                              Process:C:\Users\user\AppData\Local\Esher\parterres.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):272
                              Entropy (8bit):3.3637131196365826
                              Encrypted:false
                              SSDEEP:6:DMM8lfm3OOQdUfclwL1UEZ+lX1gl7YBAlA36nriIM8lfQVn:DsO+vNlwBQ1gl7Y2a34mA2n
                              MD5:8F35B9730DFFFC696D379EB390ED11B7
                              SHA1:40C7C0C900831D5ADBB0A4ED2ADB9279FD0550C2
                              SHA-256:F3D598F6279E48AA6FE589522B6C92D203DA8CCB3603EA0F7AA39229F88E6517
                              SHA-512:E7B87D58CB9B4E0A17A4266FA6BE7F2494E806172662BC42C7DBA14412A72C735F0131195911E7E96787DA8AE74F94AC3AADA7F6ADA5AE4A17F7A4CC4F4E26AF
                              Malicious:true
                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.E.s.h.e.r.\.p.a.r.t.e.r.r.e.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                              Process:C:\Windows\SysWOW64\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.37285107120486
                              Encrypted:false
                              SSDEEP:6144:TFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguN3iL:pV1QyWWI/glMM6kF7pq
                              MD5:AEAB47C662971705EC548D21C06CB6CC
                              SHA1:C9D4FF30DE95A984FE6422C8658F370BE90F8191
                              SHA-256:016314CE62E804BF688FC0EFD7BB2E55072C8FB5B9978468B52FDF19A2FBF8ED
                              SHA-512:E97DBA5CC0C4444AB7B3BC396E7B42BAE93E40FB8828CDF987F86C85D40D60EDCCB4BA4FE218EC4AEE079E435E1913F7DAE6D5E52615966578287AF60684941D
                              Malicious:false
                              Preview:regfD...D....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....................................................................................................................................................................................................................................................................................................................................................k.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.2889512495001405
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:LisectAVT_2403002A_107.exe
                              File size:1'183'502 bytes
                              MD5:36c9c8f8f6b3108ca50e3aed21e603cf
                              SHA1:3c15cfbe686a3f9295c282bb500c63decfc72e0e
                              SHA256:045af949637f23a5dcfcfb972a1cc9fd1d5e74b04c5a58b7439a66042c60b2fe
                              SHA512:cb552999c6f7a8baa590a5ed763be9d30f248b1c37293dbf2cf063f97d923bf19cc82c3e96a19d906bcda32f4f70d2688a7de5a9bcfab2a37b56f22fe7eb8673
                              SSDEEP:24576:pRmJkcoQricOIQxiZY1iax56w+43R4zXVy00II:mJZoQrbTFZY1iax5D9R4zX
                              TLSH:5745D011B9C58036C2A323F05E7FF75E963D692A0F26C19B37C82D6D5EA15432B29732
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                              Icon Hash:3131f99b9196c3a1
                              Entrypoint:0x4165c1
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                              Instruction
                              call 00007F1B546D6CBBh
                              jmp 00007F1B546CDB2Eh
                              int3
                              int3
                              int3
                              int3
                              int3
                              push ebp
                              mov ebp, esp
                              push edi
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              mov ecx, dword ptr [ebp+10h]
                              mov edi, dword ptr [ebp+08h]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007F1B546CDCAAh
                              cmp edi, eax
                              jc 00007F1B546CDE46h
                              cmp ecx, 00000080h
                              jc 00007F1B546CDCBEh
                              cmp dword ptr [004A9724h], 00000000h
                              je 00007F1B546CDCB5h
                              push edi
                              push esi
                              and edi, 0Fh
                              and esi, 0Fh
                              cmp edi, esi
                              pop esi
                              pop edi
                              jne 00007F1B546CDCA7h
                              jmp 00007F1B546CE082h
                              test edi, 00000003h
                              jne 00007F1B546CDCB6h
                              shr ecx, 02h
                              and edx, 03h
                              cmp ecx, 08h
                              jc 00007F1B546CDCCBh
                              rep movsd
                              jmp dword ptr [00416740h+edx*4]
                              mov eax, edi
                              mov edx, 00000003h
                              sub ecx, 04h
                              jc 00007F1B546CDCAEh
                              and eax, 03h
                              add ecx, eax
                              jmp dword ptr [00416654h+eax*4]
                              jmp dword ptr [00416750h+ecx*4]
                              nop
                              jmp dword ptr [004166D4h+ecx*4]
                              nop
                              inc cx
                              add byte ptr [eax-4BFFBE9Ah], dl
                              inc cx
                              add byte ptr [ebx], ah
                              ror dword ptr [edx-75F877FAh], 1
                              inc esi
                              add dword ptr [eax+468A0147h], ecx
                              add al, cl
                              jmp 00007F1B56B464A7h
                              add esi, 03h
                              add edi, 03h
                              cmp ecx, 08h
                              jc 00007F1B546CDC6Eh
                              rep movsd
                              jmp dword ptr [00000000h+edx*4]
                              Programming Language:
                              • [ C ] VS2010 SP1 build 40219
                              • [C++] VS2010 SP1 build 40219
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2010 SP1 build 40219
                              • [RES] VS2010 SP1 build 40219
                              • [LNK] VS2010 SP1 build 40219
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x13778.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xab0000x137780x138001949efa85c3f01968157ac2f35690ccbFalse0.08370893429487179data3.0531624849651746IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xab7c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3543 x 3543 px/mEnglishGreat Britain0.04828167514491896
                              RT_MENU0xbbfe80x50dataEnglishGreat Britain0.9
                              RT_DIALOG0xbc0380xfcdataEnglishGreat Britain0.6507936507936508
                              RT_STRING0xbc1380x530dataEnglishGreat Britain0.33960843373493976
                              RT_STRING0xbc6680x690dataEnglishGreat Britain0.26964285714285713
                              RT_STRING0xbccf80x4d0dataEnglishGreat Britain0.36363636363636365
                              RT_STRING0xbd1c80x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xbd7c80x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xbde280x388dataEnglishGreat Britain0.377212389380531
                              RT_STRING0xbe1b00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                              RT_GROUP_ICON0xbe3080x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0xbe3200x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0xbe3380x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0xbe3500x14dataEnglishGreat Britain1.25
                              RT_VERSION0xbe3680x19cdataEnglishGreat Britain0.5339805825242718
                              RT_MANIFEST0xbe5080x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                              DLLImport
                              WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                              VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                              MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                              PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                              USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                              KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                              USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                              GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                              ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                              OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              EnglishUnited States
                              TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                              2024-07-26T00:12:33.419853+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection548721177192.168.2.823.106.121.133
                              2024-07-26T00:11:22.998837+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection548631177192.168.2.823.106.121.133
                              2024-07-26T00:11:48.627180+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection548701177192.168.2.823.106.121.133
                              2024-07-26T00:12:11.030776+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection548711177192.168.2.823.106.121.133
                              2024-07-26T00:09:43.221750+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435486040.127.169.103192.168.2.8
                              2024-07-26T00:08:38.257229+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection548731177192.168.2.823.106.121.133
                              2024-07-26T00:09:03.496192+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970440.127.169.103192.168.2.8
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 26, 2024 00:11:09.246803045 CEST548631177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:09.253848076 CEST11775486323.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:09.253933907 CEST548631177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:09.260325909 CEST548631177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:09.266820908 CEST11775486323.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:22.998836994 CEST548631177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:27.201579094 CEST548701177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:27.208776951 CEST11775487023.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:27.208861113 CEST548701177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:27.217480898 CEST548701177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:27.225891113 CEST11775487023.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:48.627007961 CEST11775487023.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:48.627180099 CEST548701177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:48.627265930 CEST548701177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:48.636281013 CEST11775487023.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:49.632916927 CEST548711177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:49.641849995 CEST11775487123.106.121.133192.168.2.8
                              Jul 26, 2024 00:11:49.641925097 CEST548711177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:49.645684958 CEST548711177192.168.2.823.106.121.133
                              Jul 26, 2024 00:11:49.653336048 CEST11775487123.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:11.030636072 CEST11775487123.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:11.030776024 CEST548711177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:11.030936956 CEST548711177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:11.037619114 CEST11775487123.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:12.039411068 CEST548721177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:12.044554949 CEST11775487223.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:12.044749022 CEST548721177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:12.048002958 CEST548721177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:12.053009987 CEST11775487223.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:33.419722080 CEST11775487223.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:33.419852972 CEST548721177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:33.419878006 CEST548721177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:33.426671028 CEST11775487223.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:34.429805040 CEST548731177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:34.437498093 CEST11775487323.106.121.133192.168.2.8
                              Jul 26, 2024 00:12:34.437602043 CEST548731177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:34.441134930 CEST548731177192.168.2.823.106.121.133
                              Jul 26, 2024 00:12:34.448060036 CEST11775487323.106.121.133192.168.2.8
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 26, 2024 00:09:05.390754938 CEST53605541.1.1.1192.168.2.8
                              Jul 26, 2024 00:11:09.226859093 CEST5602853192.168.2.81.1.1.1
                              Jul 26, 2024 00:11:09.242827892 CEST53560281.1.1.1192.168.2.8
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jul 26, 2024 00:11:09.226859093 CEST192.168.2.81.1.1.10x5e75Standard query (0)jnchina.ydns.euA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jul 26, 2024 00:11:09.242827892 CEST1.1.1.1192.168.2.80x5e75No error (0)jnchina.ydns.eu23.106.121.133A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:18:08:42
                              Start date:25/07/2024
                              Path:C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                              Imagebase:0x400000
                              File size:1'183'502 bytes
                              MD5 hash:36C9C8F8F6B3108CA50E3AED21E603CF
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:18:11:01
                              Start date:25/07/2024
                              Path:C:\Users\user\AppData\Local\Esher\parterres.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                              Imagebase:0x400000
                              File size:116'526'862 bytes
                              MD5 hash:B23860489B1C2BACBB4B7382E8C4382D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000007.00000002.2836185950.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Antivirus matches:
                              • Detection: 100%, Avira
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:18:11:04
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_107.exe"
                              Imagebase:0xa10000
                              File size:46'504 bytes
                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:9
                              Start time:18:11:04
                              Start date:25/07/2024
                              Path:C:\Users\user\AppData\Local\Esher\parterres.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0x400000
                              File size:116'526'862 bytes
                              MD5 hash:B23860489B1C2BACBB4B7382E8C4382D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.2869969455.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:18:11:07
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\svchost.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0xa10000
                              File size:46'504 bytes
                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3005723032.0000000002E12000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3005699367.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000A.00000002.3005417661.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.3005894836.0000000004A1F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:true

                              Target ID:13
                              Start time:18:11:09
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 796
                              Imagebase:0xa70000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:16
                              Start time:18:11:16
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 780
                              Imagebase:0xa70000
                              File size:483'680 bytes
                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:17
                              Start time:18:11:18
                              Start date:25/07/2024
                              Path:C:\Windows\System32\wscript.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs"
                              Imagebase:0x7ff6b98f0000
                              File size:170'496 bytes
                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:18
                              Start time:18:11:19
                              Start date:25/07/2024
                              Path:C:\Users\user\AppData\Local\Esher\parterres.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0x400000
                              File size:116'526'862 bytes
                              MD5 hash:B23860489B1C2BACBB4B7382E8C4382D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000012.00000002.3016894901.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:19
                              Start time:18:11:22
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0xa10000
                              File size:46'504 bytes
                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:20
                              Start time:18:11:22
                              Start date:25/07/2024
                              Path:C:\Users\user\AppData\Local\Esher\parterres.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0x400000
                              File size:116'526'862 bytes
                              MD5 hash:B23860489B1C2BACBB4B7382E8C4382D
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000014.00000002.3049768179.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:21
                              Start time:18:11:25
                              Start date:25/07/2024
                              Path:C:\Windows\SysWOW64\svchost.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Esher\parterres.exe"
                              Imagebase:0xa10000
                              File size:46'504 bytes
                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.3888744040.0000000003000000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.3889243632.0000000004D1F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.3888811642.0000000003012000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000015.00000002.3887790648.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              Reputation:moderate
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:3.6%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:9.8%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:35
                                execution_graph 86169 4010e0 86172 401100 86169->86172 86171 4010f8 86173 401113 86172->86173 86175 401120 86173->86175 86176 401184 86173->86176 86177 40114c 86173->86177 86203 401182 86173->86203 86174 40112c DefWindowProcW 86174->86171 86175->86174 86217 401000 Shell_NotifyIconW setSBUpLow 86175->86217 86210 401250 61 API calls setSBUpLow 86176->86210 86179 401151 86177->86179 86180 40119d 86177->86180 86183 401219 86179->86183 86184 40115d 86179->86184 86181 4011a3 86180->86181 86182 42afb4 86180->86182 86181->86175 86191 4011b6 KillTimer 86181->86191 86192 4011db SetTimer RegisterWindowMessageW 86181->86192 86212 40f190 10 API calls 86182->86212 86183->86175 86188 401225 86183->86188 86187 401163 86184->86187 86193 42b01d 86184->86193 86194 42afe9 86187->86194 86195 40116c 86187->86195 86219 468b0e 74 API calls setSBUpLow 86188->86219 86189 401193 86189->86171 86190 42b04f 86218 40e0c0 74 API calls setSBUpLow 86190->86218 86211 401000 Shell_NotifyIconW setSBUpLow 86191->86211 86192->86189 86200 401204 CreatePopupMenu 86192->86200 86193->86174 86216 4370f4 52 API calls 86193->86216 86214 40f190 10 API calls 86194->86214 86195->86175 86202 401174 86195->86202 86200->86171 86213 45fd57 65 API calls setSBUpLow 86202->86213 86203->86174 86204 42afe4 86204->86189 86205 42b00e 86215 401a50 391 API calls 86205->86215 86206 4011c9 PostQuitMessage 86206->86171 86209 42afdc 86209->86174 86209->86204 86210->86189 86211->86206 86212->86189 86213->86209 86214->86205 86215->86203 86216->86203 86217->86190 86218->86203 86219->86204 86220 42d142 86224 480a8d 86220->86224 86222 42d14f 86223 480a8d 252 API calls 86222->86223 86223->86222 86225 480ae4 86224->86225 86226 480b26 86224->86226 86227 480aeb 86225->86227 86228 480b15 86225->86228 86255 40bc70 86226->86255 86230 480aee 86227->86230 86231 480b04 86227->86231 86266 4805bf 252 API calls 86228->86266 86230->86226 86233 480af3 86230->86233 86265 47fea2 252 API calls __itow_s 86231->86265 86264 47f135 252 API calls 86233->86264 86235 480aff 86281 408f40 86235->86281 86240 481156 86241 408f40 VariantClear 86240->86241 86242 48115e 86241->86242 86242->86222 86245 40c2c0 52 API calls 86252 480b2e 86245->86252 86246 408e80 VariantClear 86246->86252 86247 480ff5 86280 45e737 90 API calls 3 library calls 86247->86280 86248 40e710 53 API calls 86248->86252 86249 40a780 252 API calls 86249->86252 86252->86235 86252->86245 86252->86246 86252->86247 86252->86248 86252->86249 86260 40e0a0 86252->86260 86267 401980 86252->86267 86275 45377f 52 API calls 86252->86275 86276 45e951 53 API calls 86252->86276 86277 40e830 53 API calls 86252->86277 86278 47925f 53 API calls 86252->86278 86279 47fcff 252 API calls 86252->86279 86285 4115d7 86255->86285 86258 4115d7 52 API calls 86259 40bca6 86258->86259 86259->86252 86261 40e0b2 86260->86261 86262 40e0a8 86260->86262 86261->86252 86319 403c30 52 API calls _memmove 86262->86319 86264->86235 86265->86235 86266->86235 86268 4019a3 86267->86268 86272 401985 86267->86272 86269 4019b8 86268->86269 86268->86272 86321 403e10 53 API calls 86269->86321 86271 40199f 86271->86252 86272->86271 86320 403e10 53 API calls 86272->86320 86274 4019c4 86274->86252 86275->86252 86276->86252 86277->86252 86278->86252 86279->86252 86280->86235 86283 408f48 moneypunct 86281->86283 86282 408f55 moneypunct 86282->86240 86283->86282 86284 4265c7 VariantClear 86283->86284 86284->86282 86287 4115e1 _malloc 86285->86287 86288 40bc98 86287->86288 86291 4115fd std::exception::exception 86287->86291 86296 4135bb 86287->86296 86288->86258 86289 41163b 86311 4180af 46 API calls std::exception::operator= 86289->86311 86291->86289 86310 41130a 51 API calls __cinit 86291->86310 86292 411645 86312 418105 RaiseException 86292->86312 86295 411656 86297 413638 _malloc 86296->86297 86307 4135c9 _malloc 86296->86307 86318 417f77 46 API calls __getptd_noexit 86297->86318 86300 4135f7 RtlAllocateHeap 86300->86307 86309 413630 86300->86309 86302 413624 86316 417f77 46 API calls __getptd_noexit 86302->86316 86305 413622 86317 417f77 46 API calls __getptd_noexit 86305->86317 86306 4135d4 86306->86307 86313 418901 46 API calls 2 library calls 86306->86313 86314 418752 46 API calls 8 library calls 86306->86314 86315 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86306->86315 86307->86300 86307->86302 86307->86305 86307->86306 86309->86287 86310->86289 86311->86292 86312->86295 86313->86306 86314->86306 86316->86305 86317->86309 86318->86309 86319->86261 86320->86271 86321->86274 86322 40e1f0 86323 40e1f6 86322->86323 86325 40e228 moneypunct 86322->86325 86323->86325 86326 40e1c0 86323->86326 86327 408f40 VariantClear 86326->86327 86328 40e1cb moneypunct 86327->86328 86328->86323 86329 425ba2 86334 40e360 86329->86334 86331 425bb4 86350 41130a 51 API calls __cinit 86331->86350 86333 425bbe 86335 4115d7 52 API calls 86334->86335 86336 40e3ec GetModuleFileNameW 86335->86336 86351 413a0e 86336->86351 86338 40e421 _wcsncat 86354 413a9e 86338->86354 86341 4115d7 52 API calls 86342 40e45e _wcscpy 86341->86342 86343 40bc70 52 API calls 86342->86343 86344 40e498 86343->86344 86357 40e4c0 86344->86357 86346 40e4a9 86346->86331 86347 40e4a1 _wcscat _wcslen _wcsncpy 86347->86346 86348 4115d7 52 API calls 86347->86348 86349 401c90 52 API calls 86347->86349 86348->86347 86349->86347 86350->86333 86371 413801 86351->86371 86401 419efd 86354->86401 86413 403350 86357->86413 86359 40e4cb RegOpenKeyExW 86360 427190 RegQueryValueExW 86359->86360 86361 40e4eb 86359->86361 86362 4271b0 86360->86362 86363 42721a RegCloseKey 86360->86363 86361->86347 86364 4115d7 52 API calls 86362->86364 86363->86347 86365 4271cb 86364->86365 86420 43652f 52 API calls 86365->86420 86367 4271d8 RegQueryValueExW 86368 42720e 86367->86368 86369 4271f7 86367->86369 86368->86363 86421 402160 86369->86421 86372 41389e 86371->86372 86378 41381a 86371->86378 86373 4139e8 86372->86373 86375 413a00 86372->86375 86398 417f77 46 API calls __getptd_noexit 86373->86398 86400 417f77 46 API calls __getptd_noexit 86375->86400 86376 4139ed 86399 417f25 10 API calls __wfsopen 86376->86399 86378->86372 86386 41388a 86378->86386 86393 419e30 46 API calls __wfsopen 86378->86393 86381 41396c 86381->86372 86382 413967 86381->86382 86384 41397a 86381->86384 86382->86338 86383 413929 86383->86372 86385 413945 86383->86385 86395 419e30 46 API calls __wfsopen 86383->86395 86397 419e30 46 API calls __wfsopen 86384->86397 86385->86372 86385->86382 86389 41395b 86385->86389 86386->86372 86392 413909 86386->86392 86394 419e30 46 API calls __wfsopen 86386->86394 86396 419e30 46 API calls __wfsopen 86389->86396 86392->86381 86392->86383 86393->86386 86394->86392 86395->86385 86396->86382 86397->86382 86398->86376 86399->86382 86400->86382 86402 419f13 86401->86402 86403 419f0e 86401->86403 86410 417f77 46 API calls __getptd_noexit 86402->86410 86403->86402 86408 419f2b 86403->86408 86405 419f18 86411 417f25 10 API calls __wfsopen 86405->86411 86407 40e454 86407->86341 86408->86407 86412 417f77 46 API calls __getptd_noexit 86408->86412 86410->86405 86411->86407 86412->86405 86414 403367 86413->86414 86415 403358 86413->86415 86416 4115d7 52 API calls 86414->86416 86415->86359 86417 403370 86416->86417 86418 4115d7 52 API calls 86417->86418 86419 40339e 86418->86419 86419->86359 86420->86367 86422 426daa 86421->86422 86423 40216b _wcslen 86421->86423 86438 40c600 86422->86438 86426 402180 86423->86426 86427 40219e 86423->86427 86425 426db5 86425->86368 86434 403bd0 52 API calls moneypunct 86426->86434 86435 4013a0 86427->86435 86431 426db7 86432 402187 _memmove 86432->86368 86433 4115d7 52 API calls 86433->86432 86434->86432 86436 4115d7 52 API calls 86435->86436 86437 4013a7 86436->86437 86437->86431 86437->86433 86439 40c619 86438->86439 86440 40c60a 86438->86440 86439->86425 86440->86439 86443 4026f0 86440->86443 86442 426d7a _memmove 86442->86425 86444 426873 86443->86444 86445 4026ff 86443->86445 86446 4013a0 52 API calls 86444->86446 86445->86442 86447 42687b 86446->86447 86448 4115d7 52 API calls 86447->86448 86449 42689e _memmove 86448->86449 86449->86442 86450 416454 86487 416c70 86450->86487 86452 416460 GetStartupInfoW 86453 416474 86452->86453 86488 419d5a HeapCreate 86453->86488 86455 4164cd 86456 4164d8 86455->86456 86571 41642b 46 API calls 3 library calls 86455->86571 86489 417c20 GetModuleHandleW 86456->86489 86459 4164de 86460 4164e9 __RTC_Initialize 86459->86460 86572 41642b 46 API calls 3 library calls 86459->86572 86508 41aaa1 GetStartupInfoW 86460->86508 86464 416503 GetCommandLineW 86521 41f584 GetEnvironmentStringsW 86464->86521 86468 416513 86527 41f4d6 GetModuleFileNameW 86468->86527 86470 41651d 86471 416528 86470->86471 86574 411924 46 API calls 3 library calls 86470->86574 86531 41f2a4 86471->86531 86474 41652e 86475 416539 86474->86475 86575 411924 46 API calls 3 library calls 86474->86575 86545 411703 86475->86545 86478 416541 86480 41654c __wwincmdln 86478->86480 86576 411924 46 API calls 3 library calls 86478->86576 86549 40d6b0 86480->86549 86483 41657c 86578 411906 46 API calls _doexit 86483->86578 86486 416581 __wfsopen 86487->86452 86488->86455 86490 417c34 86489->86490 86491 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86489->86491 86579 4178ff 49 API calls _free 86490->86579 86493 417c87 TlsAlloc 86491->86493 86496 417cd5 TlsSetValue 86493->86496 86497 417d96 86493->86497 86494 417c39 86494->86459 86496->86497 86498 417ce6 __init_pointers 86496->86498 86497->86459 86580 418151 InitializeCriticalSectionAndSpinCount 86498->86580 86500 417d91 86588 4178ff 49 API calls _free 86500->86588 86502 417d2a 86502->86500 86581 416b49 86502->86581 86505 417d76 86587 41793c 46 API calls 4 library calls 86505->86587 86507 417d7e GetCurrentThreadId 86507->86497 86509 416b49 __calloc_crt 46 API calls 86508->86509 86515 41aabf 86509->86515 86510 41ac6a GetStdHandle 86516 41ac34 86510->86516 86511 41acce SetHandleCount 86520 4164f7 86511->86520 86512 416b49 __calloc_crt 46 API calls 86512->86515 86513 41ac7c GetFileType 86513->86516 86514 41abb4 86514->86516 86517 41abe0 GetFileType 86514->86517 86518 41abeb InitializeCriticalSectionAndSpinCount 86514->86518 86515->86512 86515->86514 86515->86516 86515->86520 86516->86510 86516->86511 86516->86513 86519 41aca2 InitializeCriticalSectionAndSpinCount 86516->86519 86517->86514 86517->86518 86518->86514 86518->86520 86519->86516 86519->86520 86520->86464 86573 411924 46 API calls 3 library calls 86520->86573 86522 41f595 86521->86522 86523 41f599 86521->86523 86522->86468 86598 416b04 86523->86598 86525 41f5bb _memmove 86526 41f5c2 FreeEnvironmentStringsW 86525->86526 86526->86468 86529 41f50b _wparse_cmdline 86527->86529 86528 41f54e _wparse_cmdline 86528->86470 86529->86528 86530 416b04 __malloc_crt 46 API calls 86529->86530 86530->86528 86532 41f2bc _wcslen 86531->86532 86536 41f2b4 86531->86536 86533 416b49 __calloc_crt 46 API calls 86532->86533 86538 41f2e0 _wcslen 86533->86538 86534 41f336 86605 413748 86534->86605 86536->86474 86537 416b49 __calloc_crt 46 API calls 86537->86538 86538->86534 86538->86536 86538->86537 86539 41f35c 86538->86539 86542 41f373 86538->86542 86604 41ef12 46 API calls __wfsopen 86538->86604 86540 413748 _free 46 API calls 86539->86540 86540->86536 86611 417ed3 86542->86611 86544 41f37f 86544->86474 86546 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86545->86546 86548 411750 __IsNonwritableInCurrentImage 86546->86548 86630 41130a 51 API calls __cinit 86546->86630 86548->86478 86550 42e2f3 86549->86550 86551 40d6cc 86549->86551 86552 408f40 VariantClear 86551->86552 86553 40d707 86552->86553 86631 40ebb0 86553->86631 86560 40d737 86634 411951 86560->86634 86561 40d751 86646 40f4e0 SystemParametersInfoW SystemParametersInfoW 86561->86646 86563 40d75f 86647 40d590 GetCurrentDirectoryW 86563->86647 86565 40d767 SystemParametersInfoW 86566 40d78d 86565->86566 86567 408f40 VariantClear 86566->86567 86568 40d79d 86567->86568 86569 408f40 VariantClear 86568->86569 86570 40d7a6 86569->86570 86570->86483 86577 4118da 46 API calls _doexit 86570->86577 86571->86456 86572->86460 86577->86483 86578->86486 86579->86494 86580->86502 86583 416b52 86581->86583 86584 416b8f 86583->86584 86585 416b70 Sleep 86583->86585 86589 41f677 86583->86589 86584->86500 86584->86505 86586 416b85 86585->86586 86586->86583 86586->86584 86587->86507 86588->86497 86590 41f683 86589->86590 86591 41f69e _malloc 86589->86591 86590->86591 86592 41f68f 86590->86592 86593 41f6b1 HeapAlloc 86591->86593 86596 41f6d8 86591->86596 86597 417f77 46 API calls __getptd_noexit 86592->86597 86593->86591 86593->86596 86595 41f694 86595->86583 86596->86583 86597->86595 86599 416b0d 86598->86599 86600 4135bb _malloc 45 API calls 86599->86600 86601 416b43 86599->86601 86602 416b24 Sleep 86599->86602 86600->86599 86601->86525 86603 416b39 86602->86603 86603->86599 86603->86601 86604->86538 86606 41377c __dosmaperr 86605->86606 86607 413753 RtlFreeHeap 86605->86607 86606->86536 86607->86606 86608 413768 86607->86608 86614 417f77 46 API calls __getptd_noexit 86608->86614 86610 41376e GetLastError 86610->86606 86615 417daa 86611->86615 86614->86610 86616 417dc9 setSBUpLow __call_reportfault 86615->86616 86617 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86616->86617 86618 417eb5 __call_reportfault 86617->86618 86621 41a208 86618->86621 86620 417ed1 GetCurrentProcess TerminateProcess 86620->86544 86622 41a210 86621->86622 86623 41a212 IsDebuggerPresent 86621->86623 86622->86620 86629 41fe19 86623->86629 86626 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86627 421ff0 __call_reportfault 86626->86627 86628 421ff8 GetCurrentProcess TerminateProcess 86626->86628 86627->86628 86628->86620 86629->86626 86630->86548 86687 40ebd0 86631->86687 86691 4182cb 86634->86691 86636 41195e 86698 4181f2 LeaveCriticalSection 86636->86698 86638 40d748 86639 4119b0 86638->86639 86640 4119d6 86639->86640 86641 4119bc 86639->86641 86640->86561 86641->86640 86733 417f77 46 API calls __getptd_noexit 86641->86733 86643 4119c6 86734 417f25 10 API calls __wfsopen 86643->86734 86645 4119d1 86645->86561 86646->86563 86735 401f20 86647->86735 86649 40d5b6 IsDebuggerPresent 86650 40d5c4 86649->86650 86651 42e1bb MessageBoxA 86649->86651 86652 42e1d4 86650->86652 86653 40d5e3 86650->86653 86651->86652 86908 403a50 52 API calls 3 library calls 86652->86908 86805 40f520 86653->86805 86657 40d5fd GetFullPathNameW 86817 401460 86657->86817 86659 40d63b 86660 40d643 86659->86660 86661 42e231 SetCurrentDirectoryW 86659->86661 86662 40d64c 86660->86662 86909 432fee 6 API calls 86660->86909 86661->86660 86832 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86662->86832 86665 42e252 86665->86662 86667 42e25a GetModuleFileNameW 86665->86667 86669 42e274 86667->86669 86670 42e2cb GetForegroundWindow ShellExecuteW 86667->86670 86910 401b10 86669->86910 86672 40d688 86670->86672 86671 40d656 86674 40d669 86671->86674 86906 40e0c0 74 API calls setSBUpLow 86671->86906 86679 40d692 SetCurrentDirectoryW 86672->86679 86840 4091e0 86674->86840 86679->86565 86681 42e28d 86917 40d200 52 API calls 2 library calls 86681->86917 86684 42e299 GetForegroundWindow ShellExecuteW 86685 42e2c6 86684->86685 86685->86672 86686 40ec00 LoadLibraryA GetProcAddress 86686->86560 86688 40d72e 86687->86688 86689 40ebd6 LoadLibraryA 86687->86689 86688->86560 86688->86686 86689->86688 86690 40ebe7 GetProcAddress 86689->86690 86690->86688 86692 4182e0 86691->86692 86693 4182f3 EnterCriticalSection 86691->86693 86699 418209 86692->86699 86693->86636 86695 4182e6 86695->86693 86726 411924 46 API calls 3 library calls 86695->86726 86698->86638 86700 418215 __wfsopen 86699->86700 86701 418225 86700->86701 86702 41823d 86700->86702 86727 418901 46 API calls 2 library calls 86701->86727 86704 416b04 __malloc_crt 45 API calls 86702->86704 86710 41824b __wfsopen 86702->86710 86706 418256 86704->86706 86705 41822a 86728 418752 46 API calls 8 library calls 86705->86728 86708 41825d 86706->86708 86709 41826c 86706->86709 86730 417f77 46 API calls __getptd_noexit 86708->86730 86713 4182cb __lock 45 API calls 86709->86713 86710->86695 86711 418231 86729 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86711->86729 86715 418273 86713->86715 86717 4182a6 86715->86717 86718 41827b InitializeCriticalSectionAndSpinCount 86715->86718 86719 413748 _free 45 API calls 86717->86719 86720 418297 86718->86720 86721 41828b 86718->86721 86719->86720 86732 4182c2 LeaveCriticalSection _doexit 86720->86732 86722 413748 _free 45 API calls 86721->86722 86724 418291 86722->86724 86731 417f77 46 API calls __getptd_noexit 86724->86731 86727->86705 86728->86711 86730->86710 86731->86720 86732->86710 86733->86643 86734->86645 86918 40e6e0 86735->86918 86739 401f41 GetModuleFileNameW 86936 410100 86739->86936 86741 401f5c 86948 410960 86741->86948 86744 401b10 52 API calls 86745 401f81 86744->86745 86746 401980 53 API calls 86745->86746 86747 401f8e 86746->86747 86748 408f40 VariantClear 86747->86748 86749 401f9d 86748->86749 86750 401b10 52 API calls 86749->86750 86751 401fb4 86750->86751 86752 401980 53 API calls 86751->86752 86753 401fc3 86752->86753 86754 401b10 52 API calls 86753->86754 86755 401fd2 86754->86755 86951 40c2c0 86755->86951 86757 401fe1 86758 40bc70 52 API calls 86757->86758 86759 401ff3 86758->86759 86969 401a10 86759->86969 86761 401ffe 86976 4114ab 86761->86976 86764 428b05 86766 401a10 52 API calls 86764->86766 86765 402017 86767 4114ab __wcsicoll 58 API calls 86765->86767 86768 428b18 86766->86768 86769 402022 86767->86769 86771 401a10 52 API calls 86768->86771 86769->86768 86770 40202d 86769->86770 86772 4114ab __wcsicoll 58 API calls 86770->86772 86773 428b33 86771->86773 86774 402038 86772->86774 86776 428b3b GetModuleFileNameW 86773->86776 86775 402043 86774->86775 86774->86776 86777 4114ab __wcsicoll 58 API calls 86775->86777 86778 401a10 52 API calls 86776->86778 86779 40204e 86777->86779 86780 428b6c 86778->86780 86781 402092 86779->86781 86785 401a10 52 API calls 86779->86785 86790 428b90 _wcscpy 86779->86790 86782 40e0a0 52 API calls 86780->86782 86784 4020a3 86781->86784 86781->86790 86783 428b7a 86782->86783 86786 401a10 52 API calls 86783->86786 86787 428bc6 86784->86787 86984 40e830 53 API calls 86784->86984 86788 402073 _wcscpy 86785->86788 86789 428b88 86786->86789 86796 401a10 52 API calls 86788->86796 86789->86790 86793 401a10 52 API calls 86790->86793 86792 4020bb 86985 40cf00 86792->86985 86800 4020d0 86793->86800 86795 4020c6 86797 408f40 VariantClear 86795->86797 86796->86781 86797->86800 86798 402110 86802 408f40 VariantClear 86798->86802 86799 40cf00 53 API calls 86799->86800 86800->86798 86800->86799 86803 401a10 52 API calls 86800->86803 86998 40e6a0 53 API calls 86800->86998 86804 402120 moneypunct 86802->86804 86803->86800 86804->86649 86806 4295c9 setSBUpLow 86805->86806 86807 40f53c 86805->86807 86810 4295d9 GetOpenFileNameW 86806->86810 87748 410120 86807->87748 86809 40f545 87752 4102b0 SHGetMalloc 86809->87752 86810->86807 86812 40d5f5 86810->86812 86812->86657 86812->86659 86813 40f54c 87757 410190 GetFullPathNameW 86813->87757 86815 40f559 87768 40f570 86815->87768 87822 402400 86817->87822 86819 40146f 86822 428c29 _wcscat 86819->86822 87831 401500 86819->87831 86821 40147c 86821->86822 87839 40d440 86821->87839 86824 401489 86824->86822 86825 401491 GetFullPathNameW 86824->86825 86826 402160 52 API calls 86825->86826 86827 4014bb 86826->86827 86828 402160 52 API calls 86827->86828 86829 4014c8 86828->86829 86829->86822 86830 402160 52 API calls 86829->86830 86831 4014ee 86830->86831 86831->86659 86833 428361 86832->86833 86834 4103fc LoadImageW RegisterClassExW 86832->86834 87859 44395e EnumResourceNamesW LoadImageW 86833->87859 87858 410490 7 API calls 86834->87858 86837 428368 86838 40d651 86839 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86838->86839 86839->86671 86841 409202 86840->86841 86842 42d7ad 86840->86842 86900 409216 moneypunct 86841->86900 88122 410940 391 API calls 86841->88122 88125 45e737 90 API calls 3 library calls 86842->88125 86845 409386 86846 40939c 86845->86846 88123 40f190 10 API calls 86845->88123 86846->86672 86907 401000 Shell_NotifyIconW setSBUpLow 86846->86907 86848 4095b2 86848->86846 86850 4095bf 86848->86850 86849 409253 PeekMessageW 86849->86900 88124 401a50 391 API calls 86850->88124 86852 40d410 VariantClear 86852->86900 86853 42d8cd Sleep 86853->86900 86854 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86854->86846 86857 4095f9 86854->86857 86856 42e13b 88143 40d410 VariantClear 86856->88143 86860 42e158 TranslateMessage DispatchMessageW GetMessageW 86857->86860 86860->86860 86862 42e188 86860->86862 86861 409567 PeekMessageW 86861->86900 86862->86846 86865 44c29d 52 API calls 86905 4094e0 86865->86905 86866 46fdbf 108 API calls 86866->86905 86867 46f3c1 107 API calls 86867->86900 86868 40e0a0 52 API calls 86868->86900 86869 409551 TranslateMessage DispatchMessageW 86869->86861 86871 42dcd2 WaitForSingleObject 86874 42dcf0 GetExitCodeProcess CloseHandle 86871->86874 86871->86900 86872 42dd3d Sleep 86872->86905 86873 47d33e 369 API calls 86873->86900 88132 40d410 VariantClear 86874->88132 86878 4094cf Sleep 86878->86905 86880 408f40 VariantClear 86880->86905 86882 42d94d timeGetTime 88128 465124 53 API calls 86882->88128 86884 40c620 timeGetTime 86884->86905 86885 465124 53 API calls 86885->86905 86887 42dd89 CloseHandle 86887->86905 86889 42de19 GetExitCodeProcess CloseHandle 86889->86905 86890 401b10 52 API calls 86890->86905 86893 42de88 Sleep 86893->86900 86896 401980 53 API calls 86896->86905 86897 45e737 90 API calls 86897->86900 86900->86845 86900->86849 86900->86852 86900->86853 86900->86856 86900->86861 86900->86867 86900->86868 86900->86869 86900->86871 86900->86872 86900->86873 86900->86878 86900->86882 86900->86897 86901 42e0cc VariantClear 86900->86901 86902 408f40 VariantClear 86900->86902 86900->86905 87860 4091b0 86900->87860 87918 40afa0 86900->87918 87944 408fc0 86900->87944 87979 408cc0 86900->87979 87993 4096a0 86900->87993 88120 40d150 TranslateAcceleratorW 86900->88120 88121 40d170 IsDialogMessageW GetClassLongW 86900->88121 88126 465124 53 API calls 86900->88126 88127 40c620 timeGetTime 86900->88127 88142 40e270 VariantClear moneypunct 86900->88142 86901->86900 86902->86900 86905->86865 86905->86866 86905->86880 86905->86884 86905->86885 86905->86887 86905->86889 86905->86890 86905->86893 86905->86896 86905->86900 88129 45178a 54 API calls 86905->88129 88130 47d33e 391 API calls 86905->88130 88131 453bc6 54 API calls 86905->88131 88133 40d410 VariantClear 86905->88133 88134 443d19 67 API calls _wcslen 86905->88134 88135 4574b4 VariantClear 86905->88135 88136 403cd0 86905->88136 88140 4731e1 VariantClear 86905->88140 88141 4331a2 6 API calls 86905->88141 86906->86674 86907->86672 86908->86659 86909->86665 86911 401b16 _wcslen 86910->86911 86912 4115d7 52 API calls 86911->86912 86915 401b63 86911->86915 86913 401b4b _memmove 86912->86913 86914 4115d7 52 API calls 86913->86914 86914->86915 86916 40d200 52 API calls 2 library calls 86915->86916 86916->86681 86917->86684 86919 40bc70 52 API calls 86918->86919 86920 401f31 86919->86920 86921 402560 86920->86921 86922 40256d __write_nolock 86921->86922 86923 402160 52 API calls 86922->86923 86925 402593 86923->86925 86935 4025bd 86925->86935 86999 401c90 86925->86999 86926 4026f0 52 API calls 86926->86935 86927 4026a7 86928 401b10 52 API calls 86927->86928 86934 4026db 86927->86934 86930 4026d1 86928->86930 86929 401b10 52 API calls 86929->86935 87003 40d7c0 52 API calls 2 library calls 86930->87003 86932 401c90 52 API calls 86932->86935 86934->86739 86935->86926 86935->86927 86935->86929 86935->86932 87002 40d7c0 52 API calls 2 library calls 86935->87002 87004 40f760 86936->87004 86939 410118 86939->86741 86941 42805d 86942 42806a 86941->86942 87060 431e58 86941->87060 86944 413748 _free 46 API calls 86942->86944 86945 428078 86944->86945 86946 431e58 82 API calls 86945->86946 86947 428084 86946->86947 86947->86741 86949 4115d7 52 API calls 86948->86949 86950 401f74 86949->86950 86950->86744 86952 40c2c7 86951->86952 86953 40c30e 86951->86953 86954 40c2d3 86952->86954 86962 426c79 86952->86962 86955 40c315 86953->86955 86956 426c2b 86953->86956 87730 403ea0 52 API calls __cinit 86954->87730 86960 40c321 86955->86960 86961 426c5a 86955->86961 86958 426c4b 86956->86958 86959 426c2e 86956->86959 87733 4534e3 52 API calls 86958->87733 86968 40c2de 86959->86968 87732 4534e3 52 API calls 86959->87732 87731 403ea0 52 API calls __cinit 86960->87731 87734 4534e3 52 API calls 86961->87734 87735 4534e3 52 API calls 86962->87735 86968->86757 86970 401a30 86969->86970 86971 401a17 86969->86971 86973 402160 52 API calls 86970->86973 86972 401a2d 86971->86972 87736 403c30 52 API calls _memmove 86971->87736 86972->86761 86975 401a3d 86973->86975 86975->86761 86977 411523 86976->86977 86978 4114ba 86976->86978 87739 4113a8 58 API calls 3 library calls 86977->87739 86981 40200c 86978->86981 87737 417f77 46 API calls __getptd_noexit 86978->87737 86981->86764 86981->86765 86982 4114c6 87738 417f25 10 API calls __wfsopen 86982->87738 86984->86792 86986 428ac6 86985->86986 86987 40cf0e 86985->86987 86986->86795 86988 40cf19 86987->86988 87746 40e810 52 API calls 86987->87746 86991 40cf1d 86988->86991 87747 40e950 53 API calls 86988->87747 86992 40cf38 86991->86992 86993 4115d7 52 API calls 86991->86993 86992->86795 86994 40cf88 86993->86994 86995 40cfaa 86994->86995 87740 40d290 86994->87740 86995->86795 86998->86800 87000 4026f0 52 API calls 86999->87000 87001 401c97 87000->87001 87001->86925 87002->86935 87003->86934 87064 40f6f0 87004->87064 87006 40f77b _strcat moneypunct 87072 40f850 87006->87072 87011 427c2a 87102 414d04 87011->87102 87013 40f7fc 87013->87011 87014 40f804 87013->87014 87089 414a46 87014->87089 87019 40f80e 87019->86939 87023 4528bd 87019->87023 87020 427c59 87108 414fe2 87020->87108 87022 427c79 87024 4150d1 _fseek 81 API calls 87023->87024 87025 452930 87024->87025 87632 452719 87025->87632 87028 452948 87028->86941 87029 414d04 __fread_nolock 61 API calls 87030 452966 87029->87030 87031 414d04 __fread_nolock 61 API calls 87030->87031 87032 452976 87031->87032 87033 414d04 __fread_nolock 61 API calls 87032->87033 87034 45298f 87033->87034 87035 414d04 __fread_nolock 61 API calls 87034->87035 87036 4529aa 87035->87036 87037 4150d1 _fseek 81 API calls 87036->87037 87038 4529c4 87037->87038 87039 4135bb _malloc 46 API calls 87038->87039 87040 4529cf 87039->87040 87041 4135bb _malloc 46 API calls 87040->87041 87042 4529db 87041->87042 87043 414d04 __fread_nolock 61 API calls 87042->87043 87044 4529ec 87043->87044 87045 44afef GetSystemTimeAsFileTime 87044->87045 87046 452a00 87045->87046 87047 452a36 87046->87047 87048 452a13 87046->87048 87050 452aa5 87047->87050 87051 452a3c 87047->87051 87049 413748 _free 46 API calls 87048->87049 87052 452a1c 87049->87052 87054 413748 _free 46 API calls 87050->87054 87638 44b1a9 87051->87638 87056 413748 _free 46 API calls 87052->87056 87055 452aa3 87054->87055 87055->86941 87058 452a25 87056->87058 87057 452a9d 87059 413748 _free 46 API calls 87057->87059 87058->86941 87059->87055 87061 431e64 87060->87061 87062 431e6a 87060->87062 87063 414a46 __fcloseall 82 API calls 87061->87063 87062->86942 87063->87062 87065 425de2 87064->87065 87066 40f6fc _wcslen 87064->87066 87065->87006 87067 40f710 WideCharToMultiByte 87066->87067 87068 40f756 87067->87068 87069 40f728 87067->87069 87068->87006 87070 4115d7 52 API calls 87069->87070 87071 40f735 WideCharToMultiByte 87070->87071 87071->87006 87074 40f85d setSBUpLow _strlen 87072->87074 87073 426b3b 87074->87073 87076 40f7ab 87074->87076 87121 414db8 87074->87121 87077 4149c2 87076->87077 87136 414904 87077->87136 87079 40f7e9 87079->87011 87080 40f5c0 87079->87080 87084 40f5cd _strcat __write_nolock _memmove 87080->87084 87081 414d04 __fread_nolock 61 API calls 87081->87084 87083 425d11 87085 4150d1 _fseek 81 API calls 87083->87085 87084->87081 87084->87083 87088 40f691 __tzset_nolock 87084->87088 87224 4150d1 87084->87224 87086 425d33 87085->87086 87087 414d04 __fread_nolock 61 API calls 87086->87087 87087->87088 87088->87013 87090 414a52 __wfsopen 87089->87090 87091 414a64 87090->87091 87092 414a79 87090->87092 87388 417f77 46 API calls __getptd_noexit 87091->87388 87095 415471 __lock_file 47 API calls 87092->87095 87099 414a74 __wfsopen 87092->87099 87094 414a69 87389 417f25 10 API calls __wfsopen 87094->87389 87097 414a92 87095->87097 87372 4149d9 87097->87372 87099->87019 87457 414c76 87102->87457 87104 414d1c 87105 44afef 87104->87105 87625 442c5a 87105->87625 87107 44b00d 87107->87020 87109 414fee __wfsopen 87108->87109 87110 414ffa 87109->87110 87111 41500f 87109->87111 87629 417f77 46 API calls __getptd_noexit 87110->87629 87113 415471 __lock_file 47 API calls 87111->87113 87115 415017 87113->87115 87114 414fff 87630 417f25 10 API calls __wfsopen 87114->87630 87116 414e4e __ftell_nolock 51 API calls 87115->87116 87118 415024 87116->87118 87631 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87118->87631 87120 41500a __wfsopen 87120->87022 87122 414dd6 87121->87122 87123 414deb 87121->87123 87132 417f77 46 API calls __getptd_noexit 87122->87132 87123->87122 87125 414df2 87123->87125 87134 41b91b 79 API calls 12 library calls 87125->87134 87126 414ddb 87133 417f25 10 API calls __wfsopen 87126->87133 87129 414e18 87130 414de6 87129->87130 87135 418f98 77 API calls 6 library calls 87129->87135 87130->87074 87132->87126 87133->87130 87134->87129 87135->87130 87138 414910 __wfsopen 87136->87138 87137 414923 87192 417f77 46 API calls __getptd_noexit 87137->87192 87138->87137 87141 414951 87138->87141 87140 414928 87193 417f25 10 API calls __wfsopen 87140->87193 87155 41d4d1 87141->87155 87144 414956 87145 41496a 87144->87145 87146 41495d 87144->87146 87148 414992 87145->87148 87149 414972 87145->87149 87194 417f77 46 API calls __getptd_noexit 87146->87194 87172 41d218 87148->87172 87195 417f77 46 API calls __getptd_noexit 87149->87195 87150 414933 __wfsopen @_EH4_CallFilterFunc@8 87150->87079 87156 41d4dd __wfsopen 87155->87156 87157 4182cb __lock 46 API calls 87156->87157 87158 41d4eb 87157->87158 87159 41d567 87158->87159 87167 418209 __mtinitlocknum 46 API calls 87158->87167 87170 41d560 87158->87170 87200 4154b2 47 API calls __lock 87158->87200 87201 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87158->87201 87161 416b04 __malloc_crt 46 API calls 87159->87161 87163 41d56e 87161->87163 87162 41d5f0 __wfsopen 87162->87144 87164 41d57c InitializeCriticalSectionAndSpinCount 87163->87164 87163->87170 87165 41d59c 87164->87165 87166 41d5af EnterCriticalSection 87164->87166 87169 413748 _free 46 API calls 87165->87169 87166->87170 87167->87158 87169->87170 87197 41d5fb 87170->87197 87173 41d23a 87172->87173 87174 41d255 87173->87174 87184 41d26c __wopenfile 87173->87184 87206 417f77 46 API calls __getptd_noexit 87174->87206 87176 41d25a 87207 417f25 10 API calls __wfsopen 87176->87207 87178 41d47a 87211 417f77 46 API calls __getptd_noexit 87178->87211 87179 41d48c 87203 422bf9 87179->87203 87182 41d47f 87212 417f25 10 API calls __wfsopen 87182->87212 87183 41499d 87196 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87183->87196 87184->87178 87191 41d421 87184->87191 87208 41341f 58 API calls 2 library calls 87184->87208 87187 41d41a 87187->87191 87209 41341f 58 API calls 2 library calls 87187->87209 87189 41d439 87189->87191 87210 41341f 58 API calls 2 library calls 87189->87210 87191->87178 87191->87179 87192->87140 87193->87150 87194->87150 87195->87150 87196->87150 87202 4181f2 LeaveCriticalSection 87197->87202 87199 41d602 87199->87162 87200->87158 87201->87158 87202->87199 87213 422b35 87203->87213 87205 422c14 87205->87183 87206->87176 87207->87183 87208->87187 87209->87189 87210->87191 87211->87182 87212->87183 87215 422b41 __wfsopen 87213->87215 87214 422b54 87216 417f77 __wfsopen 46 API calls 87214->87216 87215->87214 87217 422b8a 87215->87217 87218 422b59 87216->87218 87220 422400 __tsopen_nolock 109 API calls 87217->87220 87219 417f25 __wfsopen 10 API calls 87218->87219 87223 422b63 __wfsopen 87219->87223 87221 422ba4 87220->87221 87222 422bcb __wsopen_helper LeaveCriticalSection 87221->87222 87222->87223 87223->87205 87227 4150dd __wfsopen 87224->87227 87225 4150e9 87255 417f77 46 API calls __getptd_noexit 87225->87255 87227->87225 87228 41510f 87227->87228 87237 415471 87228->87237 87229 4150ee 87256 417f25 10 API calls __wfsopen 87229->87256 87236 4150f9 __wfsopen 87236->87084 87238 415483 87237->87238 87239 4154a5 EnterCriticalSection 87237->87239 87238->87239 87240 41548b 87238->87240 87241 415117 87239->87241 87242 4182cb __lock 46 API calls 87240->87242 87243 415047 87241->87243 87242->87241 87244 415067 87243->87244 87245 415057 87243->87245 87250 415079 87244->87250 87258 414e4e 87244->87258 87313 417f77 46 API calls __getptd_noexit 87245->87313 87249 41505c 87257 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87249->87257 87275 41443c 87250->87275 87253 4150b9 87288 41e1f4 87253->87288 87255->87229 87256->87236 87257->87236 87259 414e61 87258->87259 87260 414e79 87258->87260 87314 417f77 46 API calls __getptd_noexit 87259->87314 87262 414139 __flush 46 API calls 87260->87262 87264 414e80 87262->87264 87263 414e66 87315 417f25 10 API calls __wfsopen 87263->87315 87266 41e1f4 __write 51 API calls 87264->87266 87267 414e97 87266->87267 87268 414f09 87267->87268 87270 414ec9 87267->87270 87274 414e71 87267->87274 87316 417f77 46 API calls __getptd_noexit 87268->87316 87271 41e1f4 __write 51 API calls 87270->87271 87270->87274 87272 414f64 87271->87272 87273 41e1f4 __write 51 API calls 87272->87273 87272->87274 87273->87274 87274->87250 87276 414455 87275->87276 87280 414477 87275->87280 87277 414139 __flush 46 API calls 87276->87277 87276->87280 87278 414470 87277->87278 87317 41b7b2 87278->87317 87281 414139 87280->87281 87282 414145 87281->87282 87283 41415a 87281->87283 87342 417f77 46 API calls __getptd_noexit 87282->87342 87283->87253 87285 41414a 87343 417f25 10 API calls __wfsopen 87285->87343 87287 414155 87287->87253 87289 41e200 __wfsopen 87288->87289 87290 41e223 87289->87290 87291 41e208 87289->87291 87293 41e22f 87290->87293 87296 41e269 87290->87296 87364 417f8a 46 API calls __getptd_noexit 87291->87364 87366 417f8a 46 API calls __getptd_noexit 87293->87366 87294 41e20d 87365 417f77 46 API calls __getptd_noexit 87294->87365 87344 41ae56 87296->87344 87298 41e234 87367 417f77 46 API calls __getptd_noexit 87298->87367 87301 41e23c 87368 417f25 10 API calls __wfsopen 87301->87368 87302 41e26f 87304 41e291 87302->87304 87305 41e27d 87302->87305 87369 417f77 46 API calls __getptd_noexit 87304->87369 87354 41e17f 87305->87354 87306 41e215 __wfsopen 87306->87249 87309 41e289 87371 41e2c0 LeaveCriticalSection __unlock_fhandle 87309->87371 87310 41e296 87370 417f8a 46 API calls __getptd_noexit 87310->87370 87313->87249 87314->87263 87315->87274 87316->87274 87318 41b7be __wfsopen 87317->87318 87319 41b7e1 87318->87319 87320 41b7c6 87318->87320 87322 41b7ed 87319->87322 87325 41b827 87319->87325 87321 417f8a __read 46 API calls 87320->87321 87323 41b7cb 87321->87323 87324 417f8a __read 46 API calls 87322->87324 87326 417f77 __wfsopen 46 API calls 87323->87326 87327 41b7f2 87324->87327 87328 41ae56 ___lock_fhandle 48 API calls 87325->87328 87329 41b7d3 __wfsopen 87326->87329 87330 417f77 __wfsopen 46 API calls 87327->87330 87331 41b82d 87328->87331 87329->87280 87332 41b7fa 87330->87332 87333 41b83b 87331->87333 87334 41b84f 87331->87334 87335 417f25 __wfsopen 10 API calls 87332->87335 87336 41b0b5 __write_nolock 74 API calls 87333->87336 87337 417f77 __wfsopen 46 API calls 87334->87337 87335->87329 87338 41b847 87336->87338 87339 41b854 87337->87339 87341 41b87e __write LeaveCriticalSection 87338->87341 87340 417f8a __read 46 API calls 87339->87340 87340->87338 87341->87329 87342->87285 87343->87287 87345 41ae62 __wfsopen 87344->87345 87346 41aebc 87345->87346 87347 4182cb __lock 46 API calls 87345->87347 87348 41aec1 EnterCriticalSection 87346->87348 87349 41aede __wfsopen 87346->87349 87350 41ae8e 87347->87350 87348->87349 87349->87302 87351 41aeaa 87350->87351 87352 41ae97 InitializeCriticalSectionAndSpinCount 87350->87352 87353 41aeec ___lock_fhandle LeaveCriticalSection 87351->87353 87352->87351 87353->87346 87355 41aded __chsize_nolock 46 API calls 87354->87355 87356 41e18e 87355->87356 87357 41e1a4 SetFilePointer 87356->87357 87358 41e194 87356->87358 87360 41e1bb GetLastError 87357->87360 87361 41e1c3 87357->87361 87359 417f77 __wfsopen 46 API calls 87358->87359 87362 41e199 87359->87362 87360->87361 87361->87362 87363 417f9d __dosmaperr 46 API calls 87361->87363 87362->87309 87363->87362 87364->87294 87365->87306 87366->87298 87367->87301 87368->87306 87369->87310 87370->87309 87371->87306 87373 4149ea 87372->87373 87374 4149fe 87372->87374 87418 417f77 46 API calls __getptd_noexit 87373->87418 87377 41443c __flush 77 API calls 87374->87377 87386 4149fa 87374->87386 87376 4149ef 87419 417f25 10 API calls __wfsopen 87376->87419 87378 414a0a 87377->87378 87391 41d8c2 87378->87391 87382 414139 __flush 46 API calls 87383 414a18 87382->87383 87395 41d7fe 87383->87395 87385 414a1e 87385->87386 87387 413748 _free 46 API calls 87385->87387 87390 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87386->87390 87387->87386 87388->87094 87389->87099 87390->87099 87392 414a12 87391->87392 87393 41d8d2 87391->87393 87392->87382 87393->87392 87394 413748 _free 46 API calls 87393->87394 87394->87392 87396 41d80a __wfsopen 87395->87396 87397 41d812 87396->87397 87398 41d82d 87396->87398 87435 417f8a 46 API calls __getptd_noexit 87397->87435 87399 41d839 87398->87399 87404 41d873 87398->87404 87437 417f8a 46 API calls __getptd_noexit 87399->87437 87402 41d817 87436 417f77 46 API calls __getptd_noexit 87402->87436 87403 41d83e 87438 417f77 46 API calls __getptd_noexit 87403->87438 87407 41ae56 ___lock_fhandle 48 API calls 87404->87407 87409 41d879 87407->87409 87408 41d846 87439 417f25 10 API calls __wfsopen 87408->87439 87411 41d893 87409->87411 87412 41d887 87409->87412 87440 417f77 46 API calls __getptd_noexit 87411->87440 87420 41d762 87412->87420 87414 41d81f __wfsopen 87414->87385 87416 41d88d 87441 41d8ba LeaveCriticalSection __unlock_fhandle 87416->87441 87418->87376 87419->87386 87442 41aded 87420->87442 87422 41d7c8 87455 41ad67 47 API calls 2 library calls 87422->87455 87423 41d772 87423->87422 87424 41d7a6 87423->87424 87426 41aded __chsize_nolock 46 API calls 87423->87426 87424->87422 87427 41aded __chsize_nolock 46 API calls 87424->87427 87429 41d79d 87426->87429 87430 41d7b2 FindCloseChangeNotification 87427->87430 87428 41d7d0 87431 41d7f2 87428->87431 87456 417f9d 46 API calls 3 library calls 87428->87456 87432 41aded __chsize_nolock 46 API calls 87429->87432 87430->87422 87433 41d7be GetLastError 87430->87433 87431->87416 87432->87424 87433->87422 87435->87402 87436->87414 87437->87403 87438->87408 87439->87414 87440->87416 87441->87414 87443 41ae12 87442->87443 87444 41adfa 87442->87444 87446 417f8a __read 46 API calls 87443->87446 87449 41ae51 87443->87449 87445 417f8a __read 46 API calls 87444->87445 87447 41adff 87445->87447 87448 41ae23 87446->87448 87450 417f77 __wfsopen 46 API calls 87447->87450 87451 417f77 __wfsopen 46 API calls 87448->87451 87449->87423 87452 41ae07 87450->87452 87453 41ae2b 87451->87453 87452->87423 87454 417f25 __wfsopen 10 API calls 87453->87454 87454->87452 87455->87428 87456->87431 87458 414c82 __wfsopen 87457->87458 87459 414cc3 87458->87459 87460 414c96 setSBUpLow 87458->87460 87461 414cbb __wfsopen 87458->87461 87462 415471 __lock_file 47 API calls 87459->87462 87484 417f77 46 API calls __getptd_noexit 87460->87484 87461->87104 87463 414ccb 87462->87463 87470 414aba 87463->87470 87466 414cb0 87485 417f25 10 API calls __wfsopen 87466->87485 87474 414ad8 setSBUpLow 87470->87474 87477 414af2 87470->87477 87471 414ae2 87537 417f77 46 API calls __getptd_noexit 87471->87537 87473 414ae7 87538 417f25 10 API calls __wfsopen 87473->87538 87474->87471 87474->87477 87481 414b2d 87474->87481 87486 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87477->87486 87478 414c38 setSBUpLow 87540 417f77 46 API calls __getptd_noexit 87478->87540 87480 414139 __flush 46 API calls 87480->87481 87481->87477 87481->87478 87481->87480 87487 41dfcc 87481->87487 87517 41d8f3 87481->87517 87539 41e0c2 46 API calls 3 library calls 87481->87539 87484->87466 87485->87461 87486->87461 87488 41dfd8 __wfsopen 87487->87488 87489 41dfe0 87488->87489 87490 41dffb 87488->87490 87610 417f8a 46 API calls __getptd_noexit 87489->87610 87491 41e007 87490->87491 87496 41e041 87490->87496 87612 417f8a 46 API calls __getptd_noexit 87491->87612 87494 41dfe5 87611 417f77 46 API calls __getptd_noexit 87494->87611 87495 41e00c 87613 417f77 46 API calls __getptd_noexit 87495->87613 87499 41e063 87496->87499 87500 41e04e 87496->87500 87501 41ae56 ___lock_fhandle 48 API calls 87499->87501 87615 417f8a 46 API calls __getptd_noexit 87500->87615 87503 41e069 87501->87503 87505 41e077 87503->87505 87506 41e08b 87503->87506 87504 41e053 87616 417f77 46 API calls __getptd_noexit 87504->87616 87541 41da15 87505->87541 87617 417f77 46 API calls __getptd_noexit 87506->87617 87509 41e014 87614 417f25 10 API calls __wfsopen 87509->87614 87512 41e083 87619 41e0ba LeaveCriticalSection __unlock_fhandle 87512->87619 87513 41e090 87618 417f8a 46 API calls __getptd_noexit 87513->87618 87516 41dfed __wfsopen 87516->87481 87518 41d900 87517->87518 87522 41d915 87517->87522 87623 417f77 46 API calls __getptd_noexit 87518->87623 87520 41d905 87624 417f25 10 API calls __wfsopen 87520->87624 87523 41d94a 87522->87523 87528 41d910 87522->87528 87620 420603 87522->87620 87525 414139 __flush 46 API calls 87523->87525 87526 41d95e 87525->87526 87527 41dfcc __read 59 API calls 87526->87527 87529 41d965 87527->87529 87528->87481 87529->87528 87530 414139 __flush 46 API calls 87529->87530 87531 41d988 87530->87531 87531->87528 87532 414139 __flush 46 API calls 87531->87532 87533 41d994 87532->87533 87533->87528 87534 414139 __flush 46 API calls 87533->87534 87535 41d9a1 87534->87535 87536 414139 __flush 46 API calls 87535->87536 87536->87528 87537->87473 87538->87477 87539->87481 87540->87473 87542 41da31 87541->87542 87543 41da4c 87541->87543 87545 417f8a __read 46 API calls 87542->87545 87544 41da5b 87543->87544 87546 41da7a 87543->87546 87547 417f8a __read 46 API calls 87544->87547 87548 41da36 87545->87548 87551 41da98 87546->87551 87563 41daac 87546->87563 87550 41da60 87547->87550 87549 417f77 __wfsopen 46 API calls 87548->87549 87552 41da3e 87549->87552 87554 417f77 __wfsopen 46 API calls 87550->87554 87555 417f8a __read 46 API calls 87551->87555 87552->87512 87553 41db02 87557 417f8a __read 46 API calls 87553->87557 87556 41da67 87554->87556 87558 41da9d 87555->87558 87559 417f25 __wfsopen 10 API calls 87556->87559 87560 41db07 87557->87560 87561 417f77 __wfsopen 46 API calls 87558->87561 87559->87552 87564 417f77 __wfsopen 46 API calls 87560->87564 87562 41daa4 87561->87562 87566 417f25 __wfsopen 10 API calls 87562->87566 87563->87552 87563->87553 87565 41dae1 87563->87565 87568 41db1b 87563->87568 87564->87562 87565->87553 87567 41daec ReadFile 87565->87567 87566->87552 87572 41dc17 87567->87572 87573 41df8f GetLastError 87567->87573 87570 416b04 __malloc_crt 46 API calls 87568->87570 87571 41db31 87570->87571 87576 41db59 87571->87576 87577 41db3b 87571->87577 87572->87573 87580 41dc2b 87572->87580 87574 41de16 87573->87574 87575 41df9c 87573->87575 87585 417f9d __dosmaperr 46 API calls 87574->87585 87589 41dd9b 87574->87589 87578 417f77 __wfsopen 46 API calls 87575->87578 87581 420494 __lseeki64_nolock 48 API calls 87576->87581 87579 417f77 __wfsopen 46 API calls 87577->87579 87583 41dfa1 87578->87583 87584 41db40 87579->87584 87580->87589 87590 41dc47 87580->87590 87593 41de5b 87580->87593 87582 41db67 87581->87582 87582->87567 87586 417f8a __read 46 API calls 87583->87586 87587 417f8a __read 46 API calls 87584->87587 87585->87589 87586->87589 87587->87552 87588 413748 _free 46 API calls 87588->87552 87589->87552 87589->87588 87591 41dcab ReadFile 87590->87591 87598 41dd28 87590->87598 87596 41dcc9 GetLastError 87591->87596 87601 41dcd3 87591->87601 87592 41ded0 ReadFile 87594 41deef GetLastError 87592->87594 87602 41def9 87592->87602 87593->87589 87593->87592 87594->87593 87594->87602 87595 41ddec MultiByteToWideChar 87595->87589 87597 41de10 GetLastError 87595->87597 87596->87590 87596->87601 87597->87574 87598->87589 87599 41dda3 87598->87599 87600 41dd96 87598->87600 87606 41dd60 87598->87606 87599->87606 87607 41ddda 87599->87607 87603 417f77 __wfsopen 46 API calls 87600->87603 87601->87590 87604 420494 __lseeki64_nolock 48 API calls 87601->87604 87602->87593 87605 420494 __lseeki64_nolock 48 API calls 87602->87605 87603->87589 87604->87601 87605->87602 87606->87595 87608 420494 __lseeki64_nolock 48 API calls 87607->87608 87609 41dde9 87608->87609 87609->87595 87610->87494 87611->87516 87612->87495 87613->87509 87614->87516 87615->87504 87616->87509 87617->87513 87618->87512 87619->87516 87621 416b04 __malloc_crt 46 API calls 87620->87621 87622 420618 87621->87622 87622->87523 87623->87520 87624->87528 87628 4148b3 GetSystemTimeAsFileTime __aulldiv 87625->87628 87627 442c6b 87627->87107 87628->87627 87629->87114 87630->87120 87631->87120 87636 45272f __tzset_nolock _wcscpy 87632->87636 87633 414d04 61 API calls __fread_nolock 87633->87636 87634 4528a4 87634->87028 87634->87029 87635 44afef GetSystemTimeAsFileTime 87635->87636 87636->87633 87636->87634 87636->87635 87637 4150d1 81 API calls _fseek 87636->87637 87637->87636 87639 44b1bc 87638->87639 87640 44b1ca 87638->87640 87641 4149c2 116 API calls 87639->87641 87642 44b1e1 87640->87642 87643 44b1d8 87640->87643 87644 4149c2 116 API calls 87640->87644 87641->87640 87673 4321a4 87642->87673 87643->87057 87646 44b2db 87644->87646 87646->87642 87648 44b2e9 87646->87648 87647 44b224 87649 44b253 87647->87649 87650 44b228 87647->87650 87651 44b2f6 87648->87651 87654 414a46 __fcloseall 82 API calls 87648->87654 87677 43213d 87649->87677 87653 44b235 87650->87653 87656 414a46 __fcloseall 82 API calls 87650->87656 87651->87057 87657 44b245 87653->87657 87660 414a46 __fcloseall 82 API calls 87653->87660 87654->87651 87655 44b25a 87658 44b260 87655->87658 87659 44b289 87655->87659 87656->87653 87657->87057 87661 44b26d 87658->87661 87663 414a46 __fcloseall 82 API calls 87658->87663 87687 44b0bf 87659->87687 87660->87657 87664 44b27d 87661->87664 87666 414a46 __fcloseall 82 API calls 87661->87666 87663->87661 87664->87057 87665 44b28f 87696 4320f8 87665->87696 87666->87664 87669 44b2a2 87671 44b2b2 87669->87671 87672 414a46 __fcloseall 82 API calls 87669->87672 87670 414a46 __fcloseall 82 API calls 87670->87669 87671->87057 87672->87671 87674 4321b4 __tzset_nolock _memmove 87673->87674 87675 4321cb 87673->87675 87674->87647 87676 414d04 __fread_nolock 61 API calls 87675->87676 87676->87674 87678 4135bb _malloc 46 API calls 87677->87678 87679 432150 87678->87679 87680 4135bb _malloc 46 API calls 87679->87680 87681 432162 87680->87681 87682 4135bb _malloc 46 API calls 87681->87682 87683 432174 87682->87683 87684 4320f8 46 API calls 87683->87684 87685 432189 87683->87685 87686 432198 87684->87686 87685->87655 87686->87655 87688 44b18e 87687->87688 87694 44b0da 87687->87694 87708 43206e 87688->87708 87690 442caf 61 API calls 87690->87694 87694->87688 87694->87690 87695 44b19d 87694->87695 87704 442d48 87694->87704 87712 44b040 61 API calls 87694->87712 87695->87665 87697 432109 87696->87697 87700 43210f 87696->87700 87698 413748 _free 46 API calls 87697->87698 87698->87700 87699 432122 87701 432135 87699->87701 87703 413748 _free 46 API calls 87699->87703 87700->87699 87702 413748 _free 46 API calls 87700->87702 87701->87669 87701->87670 87702->87699 87703->87701 87705 442dbd 87704->87705 87707 442d60 87704->87707 87705->87707 87713 4320a4 87705->87713 87707->87694 87709 432092 87708->87709 87710 43207f 87708->87710 87709->87665 87711 4142b6 79 API calls 87710->87711 87711->87709 87712->87694 87714 4320e6 87713->87714 87715 4320cf 87713->87715 87714->87705 87717 4142b6 87715->87717 87718 4142c2 __wfsopen 87717->87718 87719 4142f2 87718->87719 87720 4142da 87718->87720 87722 4142ea __wfsopen 87718->87722 87723 415471 __lock_file 47 API calls 87719->87723 87721 417f77 __wfsopen 46 API calls 87720->87721 87724 4142df 87721->87724 87722->87714 87725 4142fa 87723->87725 87726 417f25 __wfsopen 10 API calls 87724->87726 87727 41415f 77 API calls 87725->87727 87726->87722 87728 41430f 87727->87728 87729 414326 LeaveCriticalSection LeaveCriticalSection 87728->87729 87729->87722 87730->86968 87731->86968 87732->86968 87733->86961 87734->86968 87735->86968 87736->86972 87737->86982 87738->86981 87739->86981 87741 4115d7 52 API calls 87740->87741 87742 40d29e 87741->87742 87743 426636 87742->87743 87744 401b10 52 API calls 87742->87744 87745 40cf96 87744->87745 87745->86795 87746->86988 87747->86991 87797 410160 87748->87797 87750 41012f GetFullPathNameW 87751 410147 moneypunct 87750->87751 87751->86809 87753 4102cb SHGetDesktopFolder 87752->87753 87756 410333 _wcsncpy 87752->87756 87754 4102e0 _wcsncpy 87753->87754 87753->87756 87755 41031c SHGetPathFromIDListW 87754->87755 87754->87756 87755->87756 87756->86813 87758 4101bb 87757->87758 87762 425f4a 87757->87762 87759 410160 52 API calls 87758->87759 87761 4101c7 87759->87761 87760 4114ab __wcsicoll 58 API calls 87760->87762 87801 410200 52 API calls 2 library calls 87761->87801 87762->87760 87764 425f6e 87762->87764 87764->86815 87765 4101d6 87802 410200 52 API calls 2 library calls 87765->87802 87767 4101e9 87767->86815 87769 40f760 128 API calls 87768->87769 87770 40f584 87769->87770 87771 429335 87770->87771 87772 40f58c 87770->87772 87775 4528bd 118 API calls 87771->87775 87773 40f598 87772->87773 87774 429358 87772->87774 87817 4033c0 113 API calls 7 library calls 87773->87817 87818 434034 86 API calls _wprintf 87774->87818 87778 42934b 87775->87778 87781 429373 87778->87781 87782 42934f 87778->87782 87779 429369 87779->87781 87780 40f5b4 87780->86812 87784 4115d7 52 API calls 87781->87784 87783 431e58 82 API calls 87782->87783 87783->87774 87791 4293c5 moneypunct 87784->87791 87785 42959c 87786 413748 _free 46 API calls 87785->87786 87787 4295a5 87786->87787 87788 431e58 82 API calls 87787->87788 87789 4295b1 87788->87789 87791->87785 87794 401b10 52 API calls 87791->87794 87803 402780 87791->87803 87811 4022d0 87791->87811 87819 444af8 52 API calls _memmove 87791->87819 87820 44c7dd 64 API calls 3 library calls 87791->87820 87821 44b41c 52 API calls 87791->87821 87794->87791 87798 410167 _wcslen 87797->87798 87799 4115d7 52 API calls 87798->87799 87800 41017e _wcscpy 87799->87800 87800->87750 87801->87765 87802->87767 87805 402827 87803->87805 87810 402790 moneypunct _memmove 87803->87810 87804 4115d7 52 API calls 87807 402797 87804->87807 87806 4115d7 52 API calls 87805->87806 87806->87810 87808 4115d7 52 API calls 87807->87808 87809 4027bd 87807->87809 87808->87809 87809->87791 87810->87804 87812 4022e0 87811->87812 87814 40239d 87811->87814 87813 4115d7 52 API calls 87812->87813 87812->87814 87815 402320 moneypunct 87812->87815 87813->87815 87814->87791 87815->87814 87816 4115d7 52 API calls 87815->87816 87816->87815 87817->87780 87818->87779 87819->87791 87820->87791 87821->87791 87823 402539 moneypunct 87822->87823 87824 402417 87822->87824 87823->86819 87824->87823 87825 4115d7 52 API calls 87824->87825 87826 402443 87825->87826 87827 4115d7 52 API calls 87826->87827 87828 4024b4 87827->87828 87828->87823 87830 4022d0 52 API calls 87828->87830 87851 402880 95 API calls 2 library calls 87828->87851 87830->87828 87836 401566 87831->87836 87832 401794 87852 40e9a0 90 API calls 87832->87852 87835 40167a 87838 4017c0 87835->87838 87853 45e737 90 API calls 3 library calls 87835->87853 87836->87832 87836->87835 87837 4010a0 52 API calls 87836->87837 87837->87836 87838->86821 87840 40bc70 52 API calls 87839->87840 87841 40d451 87840->87841 87842 40d50f 87841->87842 87844 427c01 87841->87844 87845 40e0a0 52 API calls 87841->87845 87847 40d519 87841->87847 87848 401b10 52 API calls 87841->87848 87854 40f310 53 API calls 87841->87854 87855 40d860 91 API calls 87841->87855 87856 410600 52 API calls 87842->87856 87857 45e737 90 API calls 3 library calls 87844->87857 87845->87841 87847->86824 87848->87841 87851->87828 87852->87835 87853->87838 87854->87841 87855->87841 87856->87847 87857->87847 87858->86838 87859->86837 87861 42c5fe 87860->87861 87876 4091c6 87860->87876 87862 40bc70 52 API calls 87861->87862 87861->87876 87863 42c64e InterlockedIncrement 87862->87863 87864 42c665 87863->87864 87870 42c697 87863->87870 87867 42c672 InterlockedDecrement Sleep InterlockedIncrement 87864->87867 87864->87870 87865 42c737 InterlockedDecrement 87866 42c74a 87865->87866 87869 408f40 VariantClear 87866->87869 87867->87864 87867->87870 87868 42c731 87868->87865 87872 42c752 87869->87872 87870->87865 87870->87868 88144 408e80 VariantClear 87870->88144 88154 410c60 VariantClear moneypunct 87872->88154 87873 42c6cf 88145 45340c 87873->88145 87876->86900 87877 42c6db 87878 402160 52 API calls 87877->87878 87879 42c6e5 87878->87879 87880 45340c 85 API calls 87879->87880 87881 42c6f1 87880->87881 88151 40d200 52 API calls 2 library calls 87881->88151 87883 42c6fb 88152 465124 53 API calls 87883->88152 87885 42c715 87886 42c76a 87885->87886 87887 42c719 87885->87887 87888 401b10 52 API calls 87886->87888 88153 46fe32 VariantClear 87887->88153 87890 42c77e 87888->87890 87891 401980 53 API calls 87890->87891 87897 42c796 87891->87897 87892 42c812 88161 46fe32 VariantClear 87892->88161 87894 42c82a InterlockedDecrement 88162 46ff07 54 API calls 87894->88162 87896 42c864 88163 45e737 90 API calls 3 library calls 87896->88163 87897->87892 87897->87896 88155 40ba10 87897->88155 87898 42c9ec 88206 47d33e 391 API calls 87898->88206 87902 42c9fe 87904 408f40 VariantClear 87914 42c849 87904->87914 87906 402780 52 API calls 87906->87914 87908 408f40 VariantClear 87910 42c891 87908->87910 88164 410c60 VariantClear moneypunct 87910->88164 87911 401980 53 API calls 87911->87914 87914->87898 87914->87904 87914->87906 87914->87911 88165 40a780 87914->88165 87915 42c874 87915->87908 87917 42ca59 87915->87917 87917->87917 87919 40afc4 87918->87919 87920 40b156 87918->87920 87921 40afd5 87919->87921 87922 42d1e3 87919->87922 88218 45e737 90 API calls 3 library calls 87920->88218 87925 40a780 252 API calls 87921->87925 87943 40b11a moneypunct 87921->87943 88219 45e737 90 API calls 3 library calls 87922->88219 87928 40b00a 87925->87928 87926 40b143 87926->86900 87927 42d1f8 87931 408f40 VariantClear 87927->87931 87928->87927 87932 40b012 87928->87932 87930 42d4db 87930->87930 87931->87926 87933 40b04a 87932->87933 87934 42d231 VariantClear 87932->87934 87935 40b094 moneypunct 87932->87935 87941 40b05c moneypunct 87933->87941 88220 40e270 VariantClear moneypunct 87933->88220 87934->87941 87936 40b108 87935->87936 87938 42d425 moneypunct 87935->87938 87936->87943 88221 40e270 VariantClear moneypunct 87936->88221 87937 42d45a VariantClear 87937->87943 87938->87937 87938->87943 87941->87935 87942 4115d7 52 API calls 87941->87942 87942->87935 87943->87926 88222 45e737 90 API calls 3 library calls 87943->88222 87945 408fff 87944->87945 87956 40900d 87944->87956 88223 403ea0 52 API calls __cinit 87945->88223 87948 42c3f6 88227 45e737 90 API calls 3 library calls 87948->88227 87950 40a780 252 API calls 87950->87956 87951 42c44a 88229 45e737 90 API calls 3 library calls 87951->88229 87952 42c47b 88230 451b42 61 API calls 87952->88230 87955 42c564 87961 408f40 VariantClear 87955->87961 87956->87948 87956->87950 87956->87951 87956->87952 87956->87955 87958 42c4cb 87956->87958 87960 42c548 87956->87960 87964 409112 87956->87964 87966 4090df 87956->87966 87968 42c528 87956->87968 87970 4090ea 87956->87970 87977 4090f2 moneypunct 87956->87977 88226 4534e3 52 API calls 87956->88226 88228 40c4e0 252 API calls 87956->88228 88232 47faae 291 API calls 87958->88232 88235 45e737 90 API calls 3 library calls 87960->88235 87961->87977 87962 42c491 87962->87977 88231 45e737 90 API calls 3 library calls 87962->88231 87963 42c4da 87963->87977 88233 45e737 90 API calls 3 library calls 87963->88233 87964->87960 87973 40912b 87964->87973 87966->87970 88224 408e80 VariantClear 87966->88224 88234 45e737 90 API calls 3 library calls 87968->88234 87974 408f40 VariantClear 87970->87974 87973->87977 88225 403e10 53 API calls 87973->88225 87974->87977 87976 40914b 87978 408f40 VariantClear 87976->87978 87977->86900 87978->87977 88236 408d90 87979->88236 87981 429778 88266 410c60 VariantClear moneypunct 87981->88266 87983 429780 87984 408cf9 87984->87981 87985 42976c 87984->87985 87987 408d2d 87984->87987 88265 45e737 90 API calls 3 library calls 87985->88265 88252 403d10 87987->88252 87990 408d71 moneypunct 87990->86900 87991 408d45 moneypunct 87991->87990 87992 408f40 VariantClear 87991->87992 87992->87991 87994 4096c6 _wcslen 87993->87994 87995 40a70c moneypunct _memmove 87994->87995 87996 4115d7 52 API calls 87994->87996 87998 4013a0 52 API calls 87995->87998 87997 4096fa _memmove 87996->87997 87999 4115d7 52 API calls 87997->87999 88001 4297aa 87998->88001 88000 40971b 87999->88000 88000->87995 88002 409749 CharUpperBuffW 88000->88002 88005 40976a moneypunct 88000->88005 88003 4115d7 52 API calls 88001->88003 88002->88005 88045 4297d1 _memmove 88003->88045 88054 4097e5 moneypunct 88005->88054 88923 47dcbb 254 API calls 88005->88923 88007 42a452 88008 408f40 VariantClear 88007->88008 88009 42ae92 88008->88009 88947 410c60 VariantClear moneypunct 88009->88947 88011 42aea4 88012 409aa2 88014 4115d7 52 API calls 88012->88014 88019 409afe 88012->88019 88012->88045 88013 40a689 88016 4115d7 52 API calls 88013->88016 88014->88019 88015 4115d7 52 API calls 88015->88054 88032 40a6af moneypunct _memmove 88016->88032 88017 409b2a 88021 429dbe 88017->88021 88025 40b400 2 API calls 88017->88025 88080 409b4d moneypunct _memmove 88017->88080 88018 40c2c0 52 API calls 88018->88054 88019->88017 88020 4115d7 52 API calls 88019->88020 88022 429d31 88020->88022 88027 429dd3 88021->88027 88031 40b400 2 API calls 88021->88031 88026 429d42 88022->88026 88927 44a801 52 API calls 88022->88927 88023 429a46 VariantClear 88023->88054 88024 409fd2 88029 40a045 88024->88029 88082 42a3f5 88024->88082 88025->88021 88036 40e0a0 52 API calls 88026->88036 88038 40e1c0 VariantClear 88027->88038 88027->88080 88034 4115d7 52 API calls 88029->88034 88030 408f40 VariantClear 88030->88054 88031->88027 88039 4115d7 52 API calls 88032->88039 88040 40a04c 88034->88040 88041 429d57 88036->88041 88038->88080 88039->87995 88044 40a0a7 88040->88044 88048 4091e0 377 API calls 88040->88048 88928 453443 52 API calls 88041->88928 88042 40ba10 52 API calls 88042->88054 88043 42a42f 88934 45e737 90 API calls 3 library calls 88043->88934 88066 40a0af 88044->88066 88935 40c790 VariantClear moneypunct 88044->88935 88946 45e737 90 API calls 3 library calls 88045->88946 88046 4299d9 88050 408f40 VariantClear 88046->88050 88048->88044 88049 429abd 88049->86900 88055 4299e2 88050->88055 88051 429d88 88929 453443 52 API calls 88051->88929 88054->88007 88054->88012 88054->88013 88054->88015 88054->88018 88054->88023 88054->88030 88054->88032 88054->88042 88054->88045 88054->88046 88054->88049 88059 40a780 252 API calls 88054->88059 88924 40c4e0 252 API calls 88054->88924 88926 40e270 VariantClear moneypunct 88054->88926 88925 410c60 VariantClear moneypunct 88055->88925 88059->88054 88060 4115d7 52 API calls 88060->88080 88061 402780 52 API calls 88061->88080 88062 44a801 52 API calls 88062->88080 88064 408f40 VariantClear 88093 40a162 moneypunct _memmove 88064->88093 88065 41130a 51 API calls __cinit 88065->88080 88067 40a11b 88066->88067 88069 42a4b4 VariantClear 88066->88069 88066->88093 88073 40a12d moneypunct 88067->88073 88936 40e270 VariantClear moneypunct 88067->88936 88068 40a780 252 API calls 88068->88080 88069->88073 88070 401980 53 API calls 88070->88080 88074 4115d7 52 API calls 88073->88074 88073->88093 88074->88093 88077 42a74d VariantClear 88077->88093 88078 40a368 88081 42aad4 88078->88081 88088 40a397 88078->88088 88079 40e270 VariantClear 88079->88093 88080->87995 88080->88024 88080->88043 88080->88060 88080->88061 88080->88062 88080->88065 88080->88068 88080->88070 88080->88082 88086 409c95 88080->88086 88930 45f508 52 API calls 88080->88930 88931 403e10 53 API calls 88080->88931 88932 408e80 VariantClear 88080->88932 88940 46fe90 VariantClear VariantClear moneypunct 88081->88940 88933 47390f VariantClear 88082->88933 88083 42a7e4 VariantClear 88083->88093 88084 42a886 VariantClear 88084->88093 88086->86900 88087 40a3ce 88100 40a3d9 moneypunct 88087->88100 88913 40b400 88087->88913 88088->88087 88090 40b400 2 API calls 88088->88090 88113 40a42c moneypunct 88088->88113 88090->88087 88091 4115d7 52 API calls 88091->88093 88092 42abaf 88096 42abd4 VariantClear 88092->88096 88107 40a4ee moneypunct 88092->88107 88093->88064 88093->88077 88093->88078 88093->88079 88093->88081 88093->88083 88093->88084 88093->88091 88095 4115d7 52 API calls 88093->88095 88937 470870 52 API calls 88093->88937 88938 408e80 VariantClear 88093->88938 88939 44ccf1 VariantClear moneypunct 88093->88939 88094 40a4dc 88094->88107 88942 40e270 VariantClear moneypunct 88094->88942 88097 42a5a6 VariantInit VariantCopy 88095->88097 88096->88107 88097->88093 88102 42a5c6 VariantClear 88097->88102 88098 42ac4f 88106 42ac79 VariantClear 88098->88106 88111 40a546 moneypunct 88098->88111 88101 40a41a 88100->88101 88104 42ab44 VariantClear 88100->88104 88100->88113 88101->88113 88941 40e270 VariantClear moneypunct 88101->88941 88102->88093 88103 40a534 88103->88111 88943 40e270 VariantClear moneypunct 88103->88943 88104->88113 88106->88111 88107->88098 88107->88103 88108 42ad28 88114 42ad4e VariantClear 88108->88114 88119 40a583 moneypunct 88108->88119 88111->88108 88112 40a571 88111->88112 88112->88119 88944 40e270 VariantClear moneypunct 88112->88944 88113->88092 88113->88094 88114->88119 88116 40a650 moneypunct 88116->86900 88117 42ae0e VariantClear 88117->88119 88119->88116 88119->88117 88945 40e270 VariantClear moneypunct 88119->88945 88120->86900 88121->86900 88122->86900 88123->86848 88124->86854 88125->86900 88126->86900 88127->86900 88128->86900 88129->86905 88130->86905 88131->86905 88132->86905 88133->86905 88134->86905 88135->86905 88137 403cdf 88136->88137 88138 408f40 VariantClear 88137->88138 88139 403ce7 88138->88139 88139->86893 88140->86905 88141->86905 88142->86900 88143->86845 88144->87873 88146 453439 88145->88146 88147 453419 88145->88147 88146->87877 88148 45342f 88147->88148 88208 4531b1 85 API calls 5 library calls 88147->88208 88148->87877 88150 453425 88150->87877 88151->87883 88152->87885 88153->87868 88154->87876 88156 40ba49 88155->88156 88157 40ba1b moneypunct _memmove 88155->88157 88159 4115d7 52 API calls 88156->88159 88158 4115d7 52 API calls 88157->88158 88160 40ba22 88158->88160 88159->88157 88160->87897 88161->87894 88162->87914 88163->87915 88164->87876 88166 40a7a6 88165->88166 88167 40ae8c 88165->88167 88169 4115d7 52 API calls 88166->88169 88209 41130a 51 API calls __cinit 88167->88209 88206->87902 88208->88150 88218->87922 88219->87927 88220->87941 88221->87943 88222->87930 88223->87956 88224->87970 88225->87976 88226->87956 88227->87977 88228->87956 88229->87977 88230->87962 88231->87977 88232->87963 88233->87977 88234->87977 88235->87955 88237 4289d2 88236->88237 88238 408db3 88236->88238 88271 45e737 90 API calls 3 library calls 88237->88271 88267 40bec0 88238->88267 88241 4289e5 88272 45e737 90 API calls 3 library calls 88241->88272 88242 408e5a 88242->87984 88244 40ba10 52 API calls 88246 408dc9 88244->88246 88245 428a05 88247 408f40 VariantClear 88245->88247 88246->88241 88246->88242 88246->88244 88246->88245 88248 40a780 252 API calls 88246->88248 88249 408e64 88246->88249 88251 408f40 VariantClear 88246->88251 88247->88242 88248->88246 88250 408f40 VariantClear 88249->88250 88250->88242 88251->88246 88253 408f40 VariantClear 88252->88253 88254 403d20 88253->88254 88255 403cd0 VariantClear 88254->88255 88256 403d4d 88255->88256 88274 40de10 88256->88274 88279 4755ad 88256->88279 88282 4749b2 88256->88282 88331 46f993 88256->88331 88370 46e1a6 88256->88370 88418 467897 88256->88418 88462 474837 88256->88462 88257 403d76 88257->87981 88257->87991 88265->87981 88266->87983 88269 40bed0 88267->88269 88268 40bef2 88268->88246 88269->88268 88273 45e737 90 API calls 3 library calls 88269->88273 88271->88241 88272->88245 88273->88268 88275 4115d7 52 API calls 88274->88275 88276 40de23 88275->88276 88531 40da20 88276->88531 88278 40de2e 88278->88257 88535 475077 88279->88535 88281 4755c0 88281->88257 88285 4749b7 __wopenfile 88282->88285 88283 45340c 85 API calls 88284 474a27 88283->88284 88638 4533b1 88284->88638 88285->88283 88287 474a36 88288 474a87 88287->88288 88289 474b5c 88287->88289 88290 474a8e 88288->88290 88291 474acb 88288->88291 88292 474b84 88289->88292 88293 474b6c 88289->88293 88644 40e830 53 API calls 88290->88644 88659 40e830 53 API calls 88291->88659 88662 40e830 53 API calls 88292->88662 88661 40e830 53 API calls 88293->88661 88298 474a9c 88302 4533b1 85 API calls 88298->88302 88299 474b94 88303 40cf00 53 API calls 88299->88303 88300 474ad9 88304 40cf00 53 API calls 88300->88304 88301 474b77 88307 402160 52 API calls 88301->88307 88305 474aaa 88302->88305 88306 474b9f 88303->88306 88308 474ae4 88304->88308 88645 403b70 88305->88645 88310 408f40 VariantClear 88306->88310 88330 474bcf 88307->88330 88311 408f40 VariantClear 88308->88311 88310->88301 88314 474aee 88311->88314 88313 474d41 88313->88257 88323 40cf00 53 API calls 88323->88330 88325 40e6a0 53 API calls 88325->88330 88328 402160 52 API calls 88328->88330 88329 403b70 52 API calls 88329->88330 88330->88313 88330->88323 88330->88325 88330->88328 88330->88329 88663 41341f 58 API calls 2 library calls 88330->88663 88664 403020 52 API calls _memmove 88330->88664 88667 40e710 88331->88667 88333 46f9ba 88334 4115d7 52 API calls 88333->88334 88342 46fa26 88333->88342 88335 46f9d3 88334->88335 88336 46f9df 88335->88336 88692 40da60 53 API calls 88335->88692 88339 4533eb 85 API calls 88336->88339 88337 46fa38 88337->88257 88341 46f9f0 88339->88341 88693 40de40 88341->88693 88342->88337 88344 46fa7a 88342->88344 88678 44c285 88342->88678 88345 46fb17 88344->88345 88346 46fa99 88344->88346 88350 40bc70 52 API calls 88345->88350 88349 4115d7 52 API calls 88346->88349 88352 46fa9f 88349->88352 88353 46fb20 88350->88353 88355 46fab6 88352->88355 88706 443ee5 ReadFile SetFilePointerEx 88352->88706 88681 46ea94 88353->88681 88371 46e1c0 88370->88371 88372 4533eb 85 API calls 88371->88372 88374 46e1dc 88372->88374 88373 46e483 88373->88257 88374->88373 88375 46e2e7 88374->88375 88376 46e1e9 88374->88376 88378 40f760 128 API calls 88375->88378 88377 45340c 85 API calls 88376->88377 88385 46e1f4 _wcscpy _wcschr 88377->88385 88379 46e2f7 88378->88379 88380 46e2fc 88379->88380 88381 46e30d 88379->88381 88383 403cd0 VariantClear 88380->88383 88382 45340c 85 API calls 88381->88382 88384 46e332 88382->88384 88386 46e2c8 88383->88386 88387 413a0e __wsplitpath 46 API calls 88384->88387 88392 46e216 _wcscat _wcscpy 88385->88392 88395 46e248 _wcscat 88385->88395 88388 408f40 VariantClear 88386->88388 88397 46e338 _wcscat _wcscpy 88387->88397 88389 46e2d0 88388->88389 88389->88257 88390 45340c 85 API calls 88391 46e264 _wcscpy 88390->88391 88883 433998 GetFileAttributesW 88391->88883 88393 45340c 85 API calls 88392->88393 88393->88395 88395->88390 88396 46e27d _wcslen 88396->88386 88398 45340c 85 API calls 88396->88398 88400 45340c 85 API calls 88397->88400 88399 46e2b0 88398->88399 88884 44bd27 80 API calls 4 library calls 88399->88884 88402 46e3e3 88400->88402 88820 433784 88402->88820 88421 4678bb 88418->88421 88419 467954 88420 4115d7 52 API calls 88419->88420 88448 467964 88419->88448 88422 467989 88420->88422 88421->88419 88423 45340c 85 API calls 88421->88423 88424 467995 88422->88424 88896 40da60 53 API calls 88422->88896 88425 4678f6 88423->88425 88428 4533eb 85 API calls 88424->88428 88426 413a0e __wsplitpath 46 API calls 88425->88426 88429 4678fc 88426->88429 88430 4679b7 88428->88430 88431 401b10 52 API calls 88429->88431 88432 40de40 60 API calls 88430->88432 88433 46790c 88431->88433 88434 4679c3 88432->88434 88894 40d200 52 API calls 2 library calls 88433->88894 88436 4679c7 GetLastError 88434->88436 88437 467a05 88434->88437 88439 403cd0 VariantClear 88436->88439 88440 467a2c 88437->88440 88441 467a4b 88437->88441 88438 467917 88438->88419 88443 4339fa 3 API calls 88438->88443 88442 4679dc 88439->88442 88444 4115d7 52 API calls 88440->88444 88445 4115d7 52 API calls 88441->88445 88446 4679e6 88442->88446 88897 44ae3e CloseHandle moneypunct 88442->88897 88447 467928 88443->88447 88449 467a31 88444->88449 88450 467a49 88445->88450 88453 408f40 VariantClear 88446->88453 88447->88419 88452 46792f 88447->88452 88448->88257 88898 436299 52 API calls 2 library calls 88449->88898 88457 408f40 VariantClear 88450->88457 88895 4335cd 56 API calls 3 library calls 88452->88895 88456 4679ed 88453->88456 88456->88257 88459 467a88 88457->88459 88458 467939 88458->88419 88460 408f40 VariantClear 88458->88460 88459->88257 88463 45340c 85 API calls 88462->88463 88464 474855 88463->88464 88465 4533b1 85 API calls 88464->88465 88466 474866 88465->88466 88467 45340c 85 API calls 88466->88467 88468 474878 88467->88468 88469 4533b1 85 API calls 88468->88469 88470 474888 88469->88470 88899 4013c0 88470->88899 88472 4748d0 88473 474897 88473->88472 88503 47498c __wopenfile 88473->88503 88532 40da37 88531->88532 88533 40da29 88531->88533 88532->88533 88534 40da3c CloseHandle 88532->88534 88533->88278 88534->88278 88586 4533eb 88535->88586 88538 4750ee 88541 408f40 VariantClear 88538->88541 88539 475129 88590 4646e0 88539->88590 88546 4750f5 88541->88546 88542 47515e 88543 475162 88542->88543 88581 47518e 88542->88581 88544 408f40 VariantClear 88543->88544 88576 475169 88544->88576 88545 475357 88547 475365 88545->88547 88548 4754ea 88545->88548 88546->88281 88554 4533eb 85 API calls 88554->88581 88563 475480 88573 4754b5 88576->88281 88581->88545 88581->88554 88581->88563 88581->88573 88581->88581 88622 436299 52 API calls 2 library calls 88581->88622 88623 463ad5 64 API calls __wcsicoll 88581->88623 88587 453404 88586->88587 88588 4533f8 88586->88588 88587->88538 88587->88539 88588->88587 88632 4531b1 85 API calls 5 library calls 88588->88632 88633 4536f7 53 API calls 88590->88633 88592 4646fc 88634 4426cd 59 API calls _wcslen 88592->88634 88594 464711 88596 40bc70 52 API calls 88594->88596 88602 46474b 88594->88602 88597 46472c 88596->88597 88635 461465 52 API calls _memmove 88597->88635 88599 464741 88600 40c600 52 API calls 88599->88600 88600->88602 88601 464793 88601->88542 88602->88601 88636 463ad5 64 API calls __wcsicoll 88602->88636 88622->88581 88623->88581 88632->88587 88633->88592 88634->88594 88635->88599 88636->88601 88639 4533e0 88638->88639 88640 4533be 88638->88640 88639->88287 88641 4533d5 88640->88641 88665 4531b1 85 API calls 5 library calls 88640->88665 88641->88287 88643 4533ca 88643->88287 88644->88298 88646 403bbd 88645->88646 88647 403b7d 88645->88647 88648 40c600 52 API calls 88646->88648 88647->88646 88649 403b86 88647->88649 88659->88300 88661->88301 88662->88299 88663->88330 88664->88330 88665->88643 88668 408f40 VariantClear 88667->88668 88669 40e71b 88668->88669 88670 4115d7 52 API calls 88669->88670 88671 40e729 88670->88671 88672 40e734 88671->88672 88673 426bdc 88671->88673 88674 426be7 88672->88674 88676 401b10 52 API calls 88672->88676 88673->88674 88675 40bc70 52 API calls 88673->88675 88675->88674 88677 40e743 88676->88677 88677->88333 88710 443d73 88678->88710 88692->88336 88706->88355 88715 40df90 88710->88715 88721 40dfa2 88715->88721 88716 425e30 88717 40e01b SetFilePointerEx 88720 40dff3 88721->88716 88721->88717 88721->88720 88883->88396 88894->88438 88895->88458 88896->88424 88897->88446 88898->88450 88900 4115d7 52 API calls 88899->88900 88901 4013e4 88900->88901 88902 4013a0 52 API calls 88901->88902 88903 4013f3 88902->88903 88903->88473 88914 40b40f 88913->88914 88922 40b45e moneypunct 88913->88922 88915 40b41f 88914->88915 88916 40b400 VariantClear 88914->88916 88917 40b400 VariantClear 88915->88917 88918 40b42a moneypunct 88915->88918 88916->88915 88917->88918 88919 40b44c 88918->88919 88920 42839c VariantClear 88918->88920 88918->88922 88919->88922 88948 40e270 VariantClear moneypunct 88919->88948 88920->88922 88922->88100 88923->88005 88924->88054 88925->88116 88926->88054 88927->88026 88928->88051 88929->88017 88930->88080 88931->88080 88932->88080 88933->88043 88934->88007 88935->88044 88936->88073 88937->88093 88938->88093 88939->88093 88940->88087 88941->88113 88942->88107 88943->88111 88944->88119 88945->88119 88946->88007 88947->88011 88948->88922 88949 17724e0 88963 1770000 88949->88963 88951 17725b3 88966 1772300 88951->88966 88969 1773630 GetPEB 88963->88969 88965 177068b 88965->88951 88967 177230d Sleep 88966->88967 88968 177231c 88967->88968 88970 177365a 88969->88970 88970->88965 88971 42b14b 88978 40bc10 88971->88978 88973 42b159 88974 4096a0 391 API calls 88973->88974 88975 42b177 88974->88975 88989 44b92d VariantClear 88975->88989 88977 42bc5b 88979 40bc24 88978->88979 88980 40bc17 88978->88980 88982 40bc2a 88979->88982 88983 40bc3c 88979->88983 88990 408e80 VariantClear 88980->88990 88991 408e80 VariantClear 88982->88991 88986 4115d7 52 API calls 88983->88986 88984 40bc1f 88984->88973 88988 40bc43 88986->88988 88987 40bc33 88987->88973 88988->88973 88989->88977 88990->88984 88991->88987 88992 425b2b 88997 40f000 88992->88997 88996 425b3a 88998 4115d7 52 API calls 88997->88998 88999 40f007 88998->88999 89000 4276ea 88999->89000 89006 40f030 88999->89006 89005 41130a 51 API calls __cinit 89005->88996 89007 40f039 89006->89007 89008 40f01a 89006->89008 89036 41130a 51 API calls __cinit 89007->89036 89010 40e500 89008->89010 89011 40bc70 52 API calls 89010->89011 89012 40e515 GetVersionExW 89011->89012 89013 402160 52 API calls 89012->89013 89014 40e557 89013->89014 89037 40e660 89014->89037 89020 427674 89024 4276c6 GetSystemInfo 89020->89024 89022 40e5e0 89025 4276d5 GetSystemInfo 89022->89025 89051 40efd0 89022->89051 89023 40e5cd GetCurrentProcess 89058 40ef20 LoadLibraryA GetProcAddress 89023->89058 89024->89025 89029 40e629 89055 40ef90 89029->89055 89032 40e641 FreeLibrary 89033 40e644 89032->89033 89034 40e653 FreeLibrary 89033->89034 89035 40e656 89033->89035 89034->89035 89035->89005 89036->89008 89038 40e667 89037->89038 89039 42761d 89038->89039 89040 40c600 52 API calls 89038->89040 89041 40e55c 89040->89041 89042 40e680 89041->89042 89043 40e687 89042->89043 89044 427616 89043->89044 89045 40c600 52 API calls 89043->89045 89046 40e566 89045->89046 89046->89020 89047 40ef60 89046->89047 89048 40e5c8 89047->89048 89049 40ef66 LoadLibraryA 89047->89049 89048->89022 89048->89023 89049->89048 89050 40ef77 GetProcAddress 89049->89050 89050->89048 89052 40e620 89051->89052 89053 40efd6 LoadLibraryA 89051->89053 89052->89024 89052->89029 89053->89052 89054 40efe7 GetProcAddress 89053->89054 89054->89052 89059 40efb0 LoadLibraryA GetProcAddress 89055->89059 89057 40e632 GetNativeSystemInfo 89057->89032 89057->89033 89058->89022 89059->89057 89060 425b5e 89065 40c7f0 89060->89065 89064 425b6d 89100 40db10 52 API calls 89065->89100 89067 40c82a 89101 410ab0 6 API calls 89067->89101 89069 40c86d 89070 40bc70 52 API calls 89069->89070 89071 40c877 89070->89071 89072 40bc70 52 API calls 89071->89072 89073 40c881 89072->89073 89074 40bc70 52 API calls 89073->89074 89075 40c88b 89074->89075 89076 40bc70 52 API calls 89075->89076 89077 40c8d1 89076->89077 89078 40bc70 52 API calls 89077->89078 89079 40c991 89078->89079 89102 40d2c0 52 API calls 89079->89102 89081 40c99b 89103 40d0d0 53 API calls 89081->89103 89083 40c9c1 89084 40bc70 52 API calls 89083->89084 89085 40c9cb 89084->89085 89104 40e310 53 API calls 89085->89104 89087 40ca28 89088 408f40 VariantClear 89087->89088 89089 40ca30 89088->89089 89090 408f40 VariantClear 89089->89090 89091 40ca38 GetStdHandle 89090->89091 89092 429630 89091->89092 89093 40ca87 89091->89093 89092->89093 89094 429639 89092->89094 89099 41130a 51 API calls __cinit 89093->89099 89105 4432c0 57 API calls 89094->89105 89096 429641 89106 44b6ab CreateThread 89096->89106 89098 42964f CloseHandle 89098->89093 89099->89064 89100->89067 89101->89069 89102->89081 89103->89083 89104->89087 89105->89096 89106->89098 89107 44b5cb 58 API calls 89106->89107 89108 425b6f 89113 40dc90 89108->89113 89112 425b7e 89114 40bc70 52 API calls 89113->89114 89115 40dd03 89114->89115 89122 40f210 89115->89122 89117 426a97 89119 40dd96 89119->89117 89120 40ddb7 89119->89120 89125 40dc00 52 API calls 2 library calls 89119->89125 89121 41130a 51 API calls __cinit 89120->89121 89121->89112 89126 40f250 RegOpenKeyExW 89122->89126 89124 40f230 89124->89119 89125->89119 89127 425e17 89126->89127 89128 40f275 RegQueryValueExW 89126->89128 89127->89124 89129 40f2c3 RegCloseKey 89128->89129 89130 40f298 89128->89130 89129->89124 89131 40f2a9 RegCloseKey 89130->89131 89132 425e1d 89130->89132 89131->89124
                                APIs
                                • _wcslen.LIBCMT ref: 004096C1
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0040970C
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                • _memmove.LIBCMT ref: 00409D96
                                • _memmove.LIBCMT ref: 0040A6C4
                                • _memmove.LIBCMT ref: 004297E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                • String ID:
                                • API String ID: 2383988440-0
                                • Opcode ID: 9ae25e017696f44beb85c0289c1770b7060c31e9a7346f95488ad8947df51518
                                • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                • Opcode Fuzzy Hash: 9ae25e017696f44beb85c0289c1770b7060c31e9a7346f95488ad8947df51518
                                • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                  • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,00000104,?), ref: 00401F4C
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                  • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                  • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                  • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                  • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                  • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                  • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                  • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                • String ID: C:\Users\user\Desktop\LisectAVT_2403002A_107.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                • API String ID: 2495805114-3647190276
                                • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2087 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 2096 40e582-40e583 2087->2096 2097 427674-427679 2087->2097 2100 40e585-40e596 2096->2100 2101 40e5ba-40e5cb call 40ef60 2096->2101 2098 427683-427686 2097->2098 2099 42767b-427681 2097->2099 2103 427693-427696 2098->2103 2104 427688-427691 2098->2104 2102 4276b4-4276be 2099->2102 2105 427625-427629 2100->2105 2106 40e59c-40e59f 2100->2106 2119 40e5ec-40e60c 2101->2119 2120 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2101->2120 2121 4276c6-4276ca GetSystemInfo 2102->2121 2103->2102 2112 427698-4276a8 2103->2112 2104->2102 2108 427636-427640 2105->2108 2109 42762b-427631 2105->2109 2110 40e5a5-40e5ae 2106->2110 2111 427654-427657 2106->2111 2108->2101 2109->2101 2115 40e5b4 2110->2115 2116 427645-42764f 2110->2116 2111->2101 2114 42765d-42766f 2111->2114 2117 4276b0 2112->2117 2118 4276aa-4276ae 2112->2118 2114->2101 2115->2101 2116->2101 2117->2102 2118->2102 2122 40e612-40e623 call 40efd0 2119->2122 2123 4276d5-4276df GetSystemInfo 2119->2123 2120->2119 2130 40e5e8 2120->2130 2121->2123 2122->2121 2129 40e629-40e63f call 40ef90 GetNativeSystemInfo 2122->2129 2133 40e641-40e642 FreeLibrary 2129->2133 2134 40e644-40e651 2129->2134 2130->2119 2133->2134 2135 40e653-40e654 FreeLibrary 2134->2135 2136 40e656-40e65d 2134->2136 2135->2136
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                • FreeLibrary.KERNEL32(?), ref: 0040E642
                                • FreeLibrary.KERNEL32(?), ref: 0040E654
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                • String ID: 0SH$Wu
                                • API String ID: 3363477735-1135818761
                                • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                APIs
                                • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: IsThemeActive$uxtheme.dll
                                • API String ID: 2574300362-3542929980
                                • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                APIs
                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FreeInfoLibraryParametersSystem
                                • String ID: Wu
                                • API String ID: 3403648963-4083010176
                                • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00000000), ref: 004339C7
                                • FindFirstFileW.KERNELBASE(?,?), ref: 004339D8
                                • FindClose.KERNEL32(00000000), ref: 004339EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirst
                                • String ID:
                                • API String ID: 48322524-0
                                • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                • TranslateMessage.USER32(?), ref: 00409556
                                • DispatchMessageW.USER32(?), ref: 00409561
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Message$Peek$DispatchSleepTranslate
                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                • API String ID: 1762048999-758534266
                                • Opcode ID: 5ae314b5a4726b376cd9545fbe42a58f9b82970646b750f3c6665e751811c2d1
                                • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                • Opcode Fuzzy Hash: 5ae314b5a4726b376cd9545fbe42a58f9b82970646b750f3c6665e751811c2d1
                                • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1230 452ac7-452b53 call 422240 call 442c5a call 4150d1 call 41313c 1239 452c30-452c3a call 452719 1230->1239 1240 452b59-452b6a call 452719 1230->1240 1244 452c3f-452c41 1239->1244 1245 452b6c-452b77 1240->1245 1246 452b7a-452c2e call 413a0e call 411567 call 411536 call 413a0e call 411536 * 2 1240->1246 1244->1245 1247 452c47-452d18 call 414d04 * 8 call 431e1f call 4149c2 1244->1247 1246->1247 1280 452d28-452d43 call 442bb4 1247->1280 1281 452d1a-452d25 1247->1281 1284 452de2-452df7 call 414a46 1280->1284 1285 452d49 1280->1285 1291 452e15-452e1a 1284->1291 1292 452df9-452e12 DeleteFileW 1284->1292 1287 452d51-452d59 1285->1287 1289 452d5f 1287->1289 1290 452d5b-452d5d 1287->1290 1293 452d64-452d86 call 414d04 1289->1293 1290->1293 1294 452ea6-452ebb CopyFileW 1291->1294 1295 452e20-452e81 call 431e9e call 431e71 call 44b1a9 1291->1295 1303 452da9-452dcc call 432229 call 4142b6 1293->1303 1304 452d88-452da7 call 442c29 1293->1304 1297 452ebd-452ed6 DeleteFileW 1294->1297 1298 452ed9-452ef5 DeleteFileW call 431ddb 1294->1298 1315 452e86-452e88 1295->1315 1306 452efa-452f02 1298->1306 1314 452dd1-452ddc 1303->1314 1304->1303 1314->1284 1317 452d4b-452d4d 1314->1317 1315->1298 1316 452e8a-452ea3 DeleteFileW 1315->1316 1317->1287
                                APIs
                                  • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                • _fseek.LIBCMT ref: 00452B3B
                                • __wsplitpath.LIBCMT ref: 00452B9B
                                • _wcscpy.LIBCMT ref: 00452BB0
                                • _wcscat.LIBCMT ref: 00452BC5
                                • __wsplitpath.LIBCMT ref: 00452BEF
                                • _wcscat.LIBCMT ref: 00452C07
                                • _wcscat.LIBCMT ref: 00452C1C
                                • __fread_nolock.LIBCMT ref: 00452C53
                                • __fread_nolock.LIBCMT ref: 00452C64
                                • __fread_nolock.LIBCMT ref: 00452C83
                                • __fread_nolock.LIBCMT ref: 00452C94
                                • __fread_nolock.LIBCMT ref: 00452CB5
                                • __fread_nolock.LIBCMT ref: 00452CC6
                                • __fread_nolock.LIBCMT ref: 00452CD7
                                • __fread_nolock.LIBCMT ref: 00452CE8
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                • __fread_nolock.LIBCMT ref: 00452D78
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                • String ID:
                                • API String ID: 2054058615-0
                                • Opcode ID: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                • Opcode Fuzzy Hash: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1318 46e1a6-46e1ba 1319 46e1c0-46e1cd call 40c650 1318->1319 1320 46e45e 1318->1320 1319->1320 1325 46e1d3-46e1d7 1319->1325 1322 46e462-46e47d call 4533eb call 445ae0 1320->1322 1329 46e483-46e48a 1322->1329 1330 46e1dc-46e1e3 1322->1330 1325->1322 1331 46e2e7-46e2fa call 40f760 1330->1331 1332 46e1e9-46e214 call 45340c call 411567 call 413e1f 1330->1332 1338 46e2fc-46e30b call 403cd0 1331->1338 1339 46e30d-46e343 call 45340c call 413a0e 1331->1339 1351 46e216-46e255 call 411567 call 411536 call 45340c call 411536 1332->1351 1352 46e258-46e282 call 45340c call 411567 call 433998 1332->1352 1346 46e2c8-46e2e4 call 408f40 1338->1346 1354 46e374-46e3fa call 411567 call 411536 * 3 call 45340c call 433784 call 4339fa 1339->1354 1355 46e345-46e34d 1339->1355 1351->1352 1380 46e284-46e29c call 4111c1 1352->1380 1381 46e29e-46e2c2 call 45340c call 44bd27 1352->1381 1397 46e403-46e405 1354->1397 1398 46e3fc-46e3ff 1354->1398 1355->1354 1359 46e34f-46e371 call 411567 * 2 1355->1359 1359->1354 1380->1346 1380->1381 1381->1329 1381->1346 1399 46e407-46e41e call 45340c call 452ac7 1397->1399 1401 46e436-46e444 call 408f40 1397->1401 1398->1399 1400 46e401 1398->1400 1408 46e423-46e425 1399->1408 1400->1401 1407 46e44b-46e45b call 431e58 1401->1407 1408->1407 1410 46e427-46e431 call 403cd0 1408->1410 1410->1401
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: >>>AUTOIT SCRIPT<<<$\
                                • API String ID: 0-1896584978
                                • Opcode ID: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                • Opcode Fuzzy Hash: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,00000104,?), ref: 00401F4C
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • __wcsicoll.LIBCMT ref: 00402007
                                • __wcsicoll.LIBCMT ref: 0040201D
                                • __wcsicoll.LIBCMT ref: 00402033
                                  • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                • __wcsicoll.LIBCMT ref: 00402049
                                • _wcscpy.LIBCMT ref: 0040207C
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,00000104), ref: 00428B5B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\LisectAVT_2403002A_107.exe$CMDLINE$CMDLINERAW
                                • API String ID: 3948761352-1706329581
                                • Opcode ID: 87ec5c523d543697834bea15f6fa7dfc3e5a53e2b167b5ab1b8a412eb5dad49b
                                • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                • Opcode Fuzzy Hash: 87ec5c523d543697834bea15f6fa7dfc3e5a53e2b167b5ab1b8a412eb5dad49b
                                • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock$_fseek_wcscpy
                                • String ID: D)E$D)E$FILE
                                • API String ID: 3888824918-361185794
                                • Opcode ID: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                • Opcode Fuzzy Hash: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                • __wsplitpath.LIBCMT ref: 0040E41C
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcsncat.LIBCMT ref: 0040E433
                                • __wmakepath.LIBCMT ref: 0040E44F
                                  • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • _wcscpy.LIBCMT ref: 0040E487
                                  • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                • _wcscat.LIBCMT ref: 00427541
                                • _wcslen.LIBCMT ref: 00427551
                                • _wcslen.LIBCMT ref: 00427562
                                • _wcscat.LIBCMT ref: 0042757C
                                • _wcsncpy.LIBCMT ref: 004275BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                • String ID: Include$\
                                • API String ID: 3173733714-3429789819
                                • Opcode ID: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                • Opcode Fuzzy Hash: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                Control-flow Graph

                                APIs
                                • _fseek.LIBCMT ref: 0045292B
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                • __fread_nolock.LIBCMT ref: 00452961
                                • __fread_nolock.LIBCMT ref: 00452971
                                • __fread_nolock.LIBCMT ref: 0045298A
                                • __fread_nolock.LIBCMT ref: 004529A5
                                • _fseek.LIBCMT ref: 004529BF
                                • _malloc.LIBCMT ref: 004529CA
                                • _malloc.LIBCMT ref: 004529D6
                                • __fread_nolock.LIBCMT ref: 004529E7
                                • _free.LIBCMT ref: 00452A17
                                • _free.LIBCMT ref: 00452A20
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                • String ID:
                                • API String ID: 1255752989-0
                                • Opcode ID: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                • Opcode Fuzzy Hash: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                • RegisterClassExW.USER32(00000030), ref: 004104ED
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                • ImageList_ReplaceIcon.COMCTL32(00A93118,000000FF,00000000), ref: 00410552
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                • LoadIconW.USER32(?,00000063), ref: 004103C0
                                • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                • RegisterClassExW.USER32(?), ref: 0041045D
                                  • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                  • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                  • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                  • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                  • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                  • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                  • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00A93118,000000FF,00000000), ref: 00410552
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _malloc
                                • String ID: Default
                                • API String ID: 1579825452-753088835
                                • Opcode ID: f12f22e30bf4923d34575f13595069fd8958cf6c96f915458a0d22b2e11f7811
                                • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                • Opcode Fuzzy Hash: f12f22e30bf4923d34575f13595069fd8958cf6c96f915458a0d22b2e11f7811
                                • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2137 40f5c0-40f5cf call 422240 2140 40f5d0-40f5e8 2137->2140 2140->2140 2141 40f5ea-40f613 call 413650 call 410e60 2140->2141 2146 40f614-40f633 call 414d04 2141->2146 2149 40f691 2146->2149 2150 40f635-40f63c 2146->2150 2151 40f696-40f69c 2149->2151 2152 40f660-40f674 call 4150d1 2150->2152 2153 40f63e 2150->2153 2157 40f679-40f67c 2152->2157 2154 40f640 2153->2154 2156 40f642-40f650 2154->2156 2158 40f652-40f655 2156->2158 2159 40f67e-40f68c 2156->2159 2157->2146 2160 40f65b-40f65e 2158->2160 2161 425d1e-425d3e call 4150d1 call 414d04 2158->2161 2162 40f68e-40f68f 2159->2162 2163 40f69f-40f6ad 2159->2163 2160->2152 2160->2154 2173 425d43-425d5f call 414d30 2161->2173 2162->2158 2164 40f6b4-40f6c2 2163->2164 2165 40f6af-40f6b2 2163->2165 2167 425d16 2164->2167 2168 40f6c8-40f6d6 2164->2168 2165->2158 2167->2161 2170 425d05-425d0b 2168->2170 2171 40f6dc-40f6df 2168->2171 2170->2156 2174 425d11 2170->2174 2171->2158 2173->2151 2174->2167
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock_fseek_memmove_strcat
                                • String ID: AU3!$EA06
                                • API String ID: 1268643489-2658333250
                                • Opcode ID: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                • Opcode Fuzzy Hash: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2177 401100-401111 2178 401113-401119 2177->2178 2179 401179-401180 2177->2179 2181 401144-40114a 2178->2181 2182 40111b-40111e 2178->2182 2179->2178 2180 401182 2179->2180 2183 40112c-401141 DefWindowProcW 2180->2183 2185 401184-40118e call 401250 2181->2185 2186 40114c-40114f 2181->2186 2182->2181 2184 401120-401126 2182->2184 2184->2183 2188 42b038-42b03f 2184->2188 2192 401193-40119a 2185->2192 2189 401151-401157 2186->2189 2190 40119d 2186->2190 2188->2183 2191 42b045-42b059 call 401000 call 40e0c0 2188->2191 2195 401219-40121f 2189->2195 2196 40115d 2189->2196 2193 4011a3-4011a9 2190->2193 2194 42afb4-42afc5 call 40f190 2190->2194 2191->2183 2193->2184 2199 4011af 2193->2199 2194->2192 2195->2184 2202 401225-42b06d call 468b0e 2195->2202 2200 401163-401166 2196->2200 2201 42b01d-42b024 2196->2201 2199->2184 2205 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2199->2205 2206 4011db-401202 SetTimer RegisterWindowMessageW 2199->2206 2208 42afe9-42b018 call 40f190 call 401a50 2200->2208 2209 40116c-401172 2200->2209 2201->2183 2207 42b02a-42b033 call 4370f4 2201->2207 2202->2192 2206->2192 2215 401204-401216 CreatePopupMenu 2206->2215 2207->2183 2208->2183 2209->2184 2217 401174-42afde call 45fd57 2209->2217 2217->2183 2228 42afe4 2217->2228 2228->2192
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                • PostQuitMessage.USER32(00000000), ref: 004011CB
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                • CreatePopupMenu.USER32 ref: 00401204
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: TaskbarCreated
                                • API String ID: 129472671-2362178303
                                • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2229 4115d7-4115df 2230 4115ee-4115f9 call 4135bb 2229->2230 2233 4115e1-4115ec call 411988 2230->2233 2234 4115fb-4115fc 2230->2234 2233->2230 2237 4115fd-41160e 2233->2237 2238 411610-41163b call 417fc0 call 41130a 2237->2238 2239 41163c-411656 call 4180af call 418105 2237->2239 2238->2239
                                APIs
                                • _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • std::exception::exception.LIBCMT ref: 00411626
                                • std::exception::exception.LIBCMT ref: 00411640
                                • __CxxThrowException@8.LIBCMT ref: 00411651
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                • String ID: ,*H$4*H$@fI
                                • API String ID: 615853336-1459471987
                                • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2248 1770920-1770972 call 1770820 CreateFileW 2251 1770974-1770976 2248->2251 2252 177097b-1770988 2248->2252 2253 1770b36-1770b3a 2251->2253 2255 177099b-17709b5 VirtualAlloc 2252->2255 2256 177098a-1770996 2252->2256 2257 17709b7-17709b9 2255->2257 2258 17709be-17709e4 CreateFileW 2255->2258 2256->2253 2257->2253 2260 17709e6-1770a03 2258->2260 2261 1770a08-1770a22 ReadFile 2258->2261 2260->2253 2262 1770a46-1770a4a 2261->2262 2263 1770a24-1770a41 2261->2263 2264 1770a6e-1770a74 2262->2264 2265 1770a4c-1770a69 2262->2265 2263->2253 2268 1770a7f-1770aa2 2264->2268 2265->2253 2270 1770ac7-1770ae1 WriteFile 2268->2270 2271 1770aa4 2268->2271 2274 1770ae3-1770b0a 2270->2274 2275 1770b0c-1770b31 FindCloseChangeNotification VirtualFree 2270->2275 2276 1770aa6-1770aac 2271->2276 2277 1770aae-1770ac5 2271->2277 2274->2253 2275->2253 2276->2270 2276->2277 2277->2268
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 01770965
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                • Instruction ID: 39fdb0af8dd2142e1ff288d55b725ef3b8e32e35adda3c270e1178734c367914
                                • Opcode Fuzzy Hash: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                • Instruction Fuzzy Hash: 7571DC75A10208EBDF24DFA4CC99FEEB7B5BF48704F108558F615BB280DA74AA44CB64

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2285 4102b0-4102c5 SHGetMalloc 2286 4102cb-4102da SHGetDesktopFolder 2285->2286 2287 425dfd-425e0e call 433244 2285->2287 2288 4102e0-41031a call 412fba 2286->2288 2289 41036b-410379 2286->2289 2297 410360-410368 2288->2297 2298 41031c-410331 SHGetPathFromIDListW 2288->2298 2289->2287 2295 41037f-410384 2289->2295 2297->2289 2299 410351-41035d 2298->2299 2300 410333-41034a call 412fba 2298->2300 2299->2297 2300->2299
                                APIs
                                • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                • _wcsncpy.LIBCMT ref: 004102ED
                                • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                • _wcsncpy.LIBCMT ref: 00410340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                • String ID: C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                                • API String ID: 3170942423-894173182
                                • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: QueryValue$CloseOpen
                                • String ID: Include$Software\AutoIt v3\AutoIt
                                • API String ID: 1586453840-614718249
                                • Opcode ID: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                • Opcode Fuzzy Hash: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                • ShowWindow.USER32(?,00000000), ref: 004105E4
                                • ShowWindow.USER32(?,00000000), ref: 004105EE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Close$OpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 1607946009-824357125
                                • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: Wu
                                • API String ID: 0-4083010176
                                • Opcode ID: 604d09616951a44443fa7c3389f4a9776e2776c2fc0726d4e0ca37b0e615cedc
                                • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                • Opcode Fuzzy Hash: 604d09616951a44443fa7c3389f4a9776e2776c2fc0726d4e0ca37b0e615cedc
                                • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01772658
                                • VirtualAlloc.KERNELBASE(00000000,000000FF,00003000,00000004), ref: 0177268D
                                • ReadFile.KERNELBASE(000000FF,00000000,000000FF,?,00000000), ref: 017726B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: File$AllocCreateReadVirtual
                                • String ID: 5KANKRXFLHLGLYLSD3N
                                • API String ID: 3585551309-2826111114
                                • Opcode ID: 5ff7c97ec76ab9b99aba586e8e1a1e763149863d26ce3abc90787c4bf52c979e
                                • Instruction ID: 1c013a339a6ae274546f717c404fe45f85be93ea6f61b6738b5e9d9741a46581
                                • Opcode Fuzzy Hash: 5ff7c97ec76ab9b99aba586e8e1a1e763149863d26ce3abc90787c4bf52c979e
                                • Instruction Fuzzy Hash: 98619170E04248DBEF11DBB4C858BEEBB79AF15300F004598E659BB2C1DBB95B44CBA5
                                APIs
                                • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process$CurrentTerminate
                                • String ID: Wu
                                • API String ID: 2429186680-4083010176
                                • Opcode ID: 5473680f56c3a9ca348df49d4f9ff9a45979ce9c7a513ffce02bb16ddd44e356
                                • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                • Opcode Fuzzy Hash: 5473680f56c3a9ca348df49d4f9ff9a45979ce9c7a513ffce02bb16ddd44e356
                                • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                • String ID:
                                • API String ID: 2782032738-0
                                • Opcode ID: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
                                • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                • Opcode Fuzzy Hash: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
                                • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                APIs
                                  • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                • _free.LIBCMT ref: 004295A0
                                  • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                  • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                  • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                  • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                  • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                  • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                                • API String ID: 3938964917-1236744051
                                • Opcode ID: 9b9d4c940d56cc07d5bec773e700796732c06f66d35bd5feef4f80f4834aa417
                                • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                • Opcode Fuzzy Hash: 9b9d4c940d56cc07d5bec773e700796732c06f66d35bd5feef4f80f4834aa417
                                • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                APIs
                                • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,0040F545,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,004A90E8,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,?,0040F545), ref: 0041013C
                                  • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                  • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                  • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                  • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                • String ID: X$pWH
                                • API String ID: 85490731-941433119
                                • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock_memmove
                                • String ID: EA06
                                • API String ID: 1988441806-3962188686
                                • Opcode ID: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                • Opcode Fuzzy Hash: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 017710A5
                                • ExitProcess.KERNEL32(00000000), ref: 017710C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process$CreateExit
                                • String ID: D
                                • API String ID: 126409537-2746444292
                                • Opcode ID: 5daa9b7238fa4ec1454e6c1b31ac8cab11c4b0ae369da0b25f7351ff99cfb3b0
                                • Instruction ID: a16dd856800db1407344420f015ad32a95b597eef9949b979844a680bc99b626
                                • Opcode Fuzzy Hash: 5daa9b7238fa4ec1454e6c1b31ac8cab11c4b0ae369da0b25f7351ff99cfb3b0
                                • Instruction Fuzzy Hash: 1DF0EC75A4024CABDF60DFE0CD49FEEB77CBF04701F408508BB1A9A184DB7496088B61
                                APIs
                                • _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 00401B57
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                • String ID: @EXITCODE
                                • API String ID: 2734553683-3436989551
                                • Opcode ID: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                • Opcode Fuzzy Hash: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                Strings
                                • C:\Users\user\Desktop\LisectAVT_2403002A_107.exe, xrefs: 00410107
                                • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _strcat
                                • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                                • API String ID: 1765576173-3003650305
                                • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00431E4C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
                                • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                • String ID:
                                • API String ID: 1794320848-0
                                • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                  • Part of subcall function 00403B70: _memmove.LIBCMT ref: 00403BA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$_malloc_memmove
                                • String ID: \5@
                                • API String ID: 961785871-1309314528
                                • Opcode ID: 255d5d923884db79fe764bac5b381414ed05d37ffaa90619b81b855cde83afde
                                • Instruction ID: cad64edcdcba5d9ec8cd2b6a335bbe98b4fe19d5968b0e5b1ca7a0aa7405deab
                                • Opcode Fuzzy Hash: 255d5d923884db79fe764bac5b381414ed05d37ffaa90619b81b855cde83afde
                                • Instruction Fuzzy Hash: 7801D6713402007FE714AB669C86F6B7B9CDB85725F14403ABA09DB2D1D9B1ED008365
                                APIs
                                • _malloc.LIBCMT ref: 0043214B
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • _malloc.LIBCMT ref: 0043215D
                                • _malloc.LIBCMT ref: 0043216F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _malloc$AllocateHeap
                                • String ID:
                                • API String ID: 680241177-0
                                • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                APIs
                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00431DF5
                                • SetFileTime.KERNELBASE(00000000,?,00000000,?), ref: 00431E0D
                                • CloseHandle.KERNEL32(00000000), ref: 00431E14
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleTime
                                • String ID:
                                • API String ID: 3397143404-0
                                • Opcode ID: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                • Instruction ID: 810a19753c0f2c4684b0bfc273ce87ce290b2c8a2af4acb4f2079771c7d617b3
                                • Opcode Fuzzy Hash: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                • Instruction Fuzzy Hash: 50E01275240214BBE6205B54DC4EF9F7758AB49B20F108615FF156B1D0C6B4695187A8
                                APIs
                                • _free.LIBCMT ref: 0043210A
                                  • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                  • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                • _free.LIBCMT ref: 0043211D
                                • _free.LIBCMT ref: 00432130
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                APIs
                                • __wsplitpath.LIBCMT ref: 004678F7
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLast__wsplitpath_malloc
                                • String ID:
                                • API String ID: 4163294574-0
                                • Opcode ID: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                • Opcode Fuzzy Hash: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                APIs
                                  • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                • _strcat.LIBCMT ref: 0040F786
                                  • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                  • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                • String ID:
                                • API String ID: 3199840319-0
                                • Opcode ID: d436c938a46f367dac14fd12e9d195e33454a3a3ad552c93056e25c4a3c00ba1
                                • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                • Opcode Fuzzy Hash: d436c938a46f367dac14fd12e9d195e33454a3a3ad552c93056e25c4a3c00ba1
                                • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                • Opcode Fuzzy Hash: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                APIs
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                • __lock_file.LIBCMT ref: 00414A8D
                                  • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                • __fclose_nolock.LIBCMT ref: 00414A98
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                • String ID:
                                • API String ID: 2800547568-0
                                • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                APIs
                                • __lock_file.LIBCMT ref: 00415012
                                • __ftell_nolock.LIBCMT ref: 0041501F
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __ftell_nolock__getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2999321469-0
                                • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID:
                                • API String ID: 1038674560-0
                                • Opcode ID: 9aafb028a3cd8fbfc555f02754f1627ecafb102caf0497a3e1049f7d4fc54202
                                • Instruction ID: 48e799bfcc3e4854892c5a8f878c3779eb6fcb7b6fb01ff98fb07da95314ea3f
                                • Opcode Fuzzy Hash: 9aafb028a3cd8fbfc555f02754f1627ecafb102caf0497a3e1049f7d4fc54202
                                • Instruction Fuzzy Hash: E0F183715083019FC710DF25C881B6BB7E5AFC8718F14892EF988AB381D779E945CB9A
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0046FAF1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _malloc_memmove
                                • String ID:
                                • API String ID: 1183979061-0
                                • Opcode ID: 2596c1eaf5a3950e5dcb68120193809c73b970c48b482c968feef1aff4c1c7ab
                                • Instruction ID: 255320ec14e83fec4e4552c633d3a07f96161bd336a5b43614f928d9f0269463
                                • Opcode Fuzzy Hash: 2596c1eaf5a3950e5dcb68120193809c73b970c48b482c968feef1aff4c1c7ab
                                • Instruction Fuzzy Hash: E551E6722043009BD310EF65DD82F5BB399AF89704F14492FF9859B382DB39E909C79A
                                APIs
                                  • Part of subcall function 017708E0: GetFileAttributesW.KERNELBASE(?), ref: 017708EB
                                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 01771208
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AttributesCreateDirectoryFile
                                • String ID:
                                • API String ID: 3401506121-0
                                • Opcode ID: 9d25be62c895f525a026d087e805afa3cbcf1473e359597afe81076c8459dcb5
                                • Instruction ID: 16a38bb025a60ad895fbfac7f31e213ee48bb79a047e6154150153715d9594da
                                • Opcode Fuzzy Hash: 9d25be62c895f525a026d087e805afa3cbcf1473e359597afe81076c8459dcb5
                                • Instruction Fuzzy Hash: D751B871A1420997EF14EF70C944BEFB339EF58300F4045A8A60DE7290EB79AB05CBA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 97585ac3e0ae710bbaaea1354a507d6ed28ae6c6b32ef7ac18afbde48e1848f6
                                • Instruction ID: a0cb4a685bc4076edb0c92555cc2ccf01117698ee9930ed5143de82f70a35859
                                • Opcode Fuzzy Hash: 97585ac3e0ae710bbaaea1354a507d6ed28ae6c6b32ef7ac18afbde48e1848f6
                                • Instruction Fuzzy Hash: D131A5B46002009BDB20DB26C884F2BB368EF45714B14892FEE4597352D73DE945D7DE
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 9a24d8320632ccca4e5ed4a8b3ba252958572556e0df63862acdb3b70f90cc7b
                                • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                • Opcode Fuzzy Hash: 9a24d8320632ccca4e5ed4a8b3ba252958572556e0df63862acdb3b70f90cc7b
                                • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                APIs
                                • SetFilePointerEx.KERNELBASE(?,?,00002000,00000000,?,?,00002000), ref: 0040E028
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                • Instruction ID: 77665f5636f8aa13b7259ebce8dce40215e8c2ccffea67f4db7731d49ba0d040
                                • Opcode Fuzzy Hash: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                • Instruction Fuzzy Hash: 6C319C71B007159FCB24CF6EC88496BB7F6FB84310B14CA3EE45A93740D679E9458B54
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 0c15185af1363eaa085c66392625b8a79a4b8195e1736ab7474c681c96848762
                                • Instruction ID: f795c94f21b42bfaa1f1d864c387b497e6b2772b6b59ffbe067e85bcfecebbdf
                                • Opcode Fuzzy Hash: 0c15185af1363eaa085c66392625b8a79a4b8195e1736ab7474c681c96848762
                                • Instruction Fuzzy Hash: 65316170600608EBEF509F12DA816AE7BF4FF45751F20C82AEC99CA611E738D590CB99
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 91190e6d55c15e9f1799f68576469a56a750aebe36a3c3e2b8a11b43725b0c86
                                • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                • Opcode Fuzzy Hash: 91190e6d55c15e9f1799f68576469a56a750aebe36a3c3e2b8a11b43725b0c86
                                • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                APIs
                                • ReadFile.KERNELBASE(00000000,?,00010000,?,00000000,?,?), ref: 00403962
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                • Instruction ID: 166f8584a356b396cff84430351b18548b9fac1e31d224f9c9bf96d02c5d03dd
                                • Opcode Fuzzy Hash: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                • Instruction Fuzzy Hash: 42111CB1200B019FD320CF55C984F27BBF8AB44711F10892ED5AA96B80D7B4FA45CBA4
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0044C1F2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _malloc_memmove
                                • String ID:
                                • API String ID: 1183979061-0
                                • Opcode ID: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                • Instruction ID: 60fa024ef6ba522ef03b0058c27b5a86e99fade8cb479355d4b2ad9ce4e818de
                                • Opcode Fuzzy Hash: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                • Instruction Fuzzy Hash: 25017574504640AFD321EF59C841D67B7E9EF99704B14845EF9D687702C675FC02C7A4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __lock_file
                                • String ID:
                                • API String ID: 3031932315-0
                                • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                APIs
                                • __lock_file.LIBCMT ref: 004142F5
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2597487223-0
                                • Opcode ID: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                • Instruction ID: 8e443c470cd329b51aa0b2c66eafbe77d500ce91655981cf057e69b52ab9faa9
                                • Opcode Fuzzy Hash: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                • Instruction Fuzzy Hash: 34F0C230A00219EBCF11BFB188024DF7B71EF44754F01845BF4205A151C73C8AD1EB99
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                • Instruction ID: 9e9a42c0c7b58ac35d14f3716b04d6bdbb365f426eb98045716108692e45ddfa
                                • Opcode Fuzzy Hash: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                • Instruction Fuzzy Hash: 82F01CB16047045FDB35CA24D941BA3B7E89B4A350F00481EFAAA87342D6B6B845CA99
                                APIs
                                • GetFileAttributesW.KERNELBASE(?), ref: 017708EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                • Instruction ID: 3ab4187c9e98b41e0b7754bfba85805992829a9c1f4851832d010e0092eed8db
                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                • Instruction Fuzzy Hash: 76E0C271A0520DEBEF20CBBCCC08AADB7A8EB06320F004794F91AC32C0D5309A40DB54
                                APIs
                                • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,?,00000001,?,00002000), ref: 0040E068
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                • Instruction ID: 8945df8720cd9eebd038067e403ceee2f4781b994f17f63e488f9437ca0746d3
                                • Opcode Fuzzy Hash: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                • Instruction Fuzzy Hash: ACE01275600208BFC704DFA4DC45DAE77B9E748601F008668FD01D7340D671AD5087A5
                                APIs
                                • GetFileAttributesW.KERNELBASE(?), ref: 017708BB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                • Instruction ID: 5f4f48403c3ffc2dee4a0bcb04a8d89e7eb6b88b077430030bf1223b21e22fed
                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                • Instruction Fuzzy Hash: 1BD0A73094630CEBCF10CFB89C04ADAB3A8DB09320F004794FD15D3281D63199509790
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wfsopen
                                • String ID:
                                • API String ID: 197181222-0
                                • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                APIs
                                • Sleep.KERNELBASE(000007D0), ref: 01772312
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 3096e14d89e75d91452536fdabd5f28b039f6dbb9701e42d89b7019d45377341
                                • Instruction ID: d7cce6e9f0a41da83cc989ac26a9f2388d989b898cf04c8ffd2b25efaf6d65e7
                                • Opcode Fuzzy Hash: 3096e14d89e75d91452536fdabd5f28b039f6dbb9701e42d89b7019d45377341
                                • Instruction Fuzzy Hash: FF01B231A4010EABCF04EFA4C9899EEBB75FF04311F104595FA2AA6581DB30AA51CBA1
                                APIs
                                • Sleep.KERNELBASE(000007D0), ref: 01772312
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                • Instruction ID: 44c0c130546f27b47abbb8c6931f11f55d4c1bb93a373bc4ca3ffb1a40027888
                                • Opcode Fuzzy Hash: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                • Instruction Fuzzy Hash: 32F0C931A4010EAFCF00EFB4C9499EEBB74FF04311F504555FA2AA2181DB30AA51CB61
                                APIs
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                • GetKeyState.USER32(00000011), ref: 0047C92D
                                • GetKeyState.USER32(00000009), ref: 0047C936
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                • GetKeyState.USER32(00000010), ref: 0047C953
                                • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                • _wcsncpy.LIBCMT ref: 0047CA29
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                • SendMessageW.USER32 ref: 0047CA7F
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                • ImageList_SetDragCursorImage.COMCTL32(00A93118,00000000,00000000,00000000), ref: 0047CB9B
                                • ImageList_BeginDrag.COMCTL32(00A93118,00000000,000000F8,000000F0), ref: 0047CBAC
                                • SetCapture.USER32(?), ref: 0047CBB6
                                • ClientToScreen.USER32(?,?), ref: 0047CC17
                                • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                • ReleaseCapture.USER32 ref: 0047CC3A
                                • GetCursorPos.USER32(?), ref: 0047CC72
                                • ScreenToClient.USER32(?,?), ref: 0047CC80
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                • SendMessageW.USER32 ref: 0047CD12
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                • SendMessageW.USER32 ref: 0047CD80
                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                • GetCursorPos.USER32(?), ref: 0047CDC8
                                • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                • GetParent.USER32(00000000), ref: 0047CDF7
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                • SendMessageW.USER32 ref: 0047CE93
                                • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,009C1AF8,00000000,?,?,?,?), ref: 0047CF1C
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                • SendMessageW.USER32 ref: 0047CF6B
                                • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                • TrackPopupMenuEx.USER32(?,00000080,?,?,009C1AF8,00000000,?,?,?,?), ref: 0047CFE6
                                • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                • String ID: @GUI_DRAGID$F
                                • API String ID: 3100379633-4164748364
                                • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                APIs
                                • GetForegroundWindow.USER32 ref: 00434420
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                • IsIconic.USER32(?), ref: 0043444F
                                • ShowWindow.USER32(?,00000009), ref: 0043445C
                                • SetForegroundWindow.USER32(?), ref: 0043446A
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                • GetCurrentThreadId.KERNEL32 ref: 00434485
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                • keybd_event.USER32(00000012,00000000), ref: 00434514
                                • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 2889586943-2988720461
                                • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                APIs
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                • CloseHandle.KERNEL32(?), ref: 004463A0
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                • GetProcessWindowStation.USER32 ref: 004463D1
                                • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                • _wcslen.LIBCMT ref: 00446498
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _wcsncpy.LIBCMT ref: 004464C0
                                • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                • CloseWindowStation.USER32(00000000), ref: 0044656C
                                • CloseDesktop.USER32(?), ref: 0044657A
                                • SetProcessWindowStation.USER32(?), ref: 00446588
                                • CloseHandle.KERNEL32(?), ref: 00446592
                                • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                • String ID: $@OH$default$winsta0
                                • API String ID: 3324942560-3791954436
                                • Opcode ID: 11f38dc6e530004143aa82e850882ed2c1899f1a5cc1f50c4fde15905bb6d016
                                • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                • Opcode Fuzzy Hash: 11f38dc6e530004143aa82e850882ed2c1899f1a5cc1f50c4fde15905bb6d016
                                • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                • FindClose.KERNEL32(00000000), ref: 00478924
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                • __swprintf.LIBCMT ref: 004789D3
                                • __swprintf.LIBCMT ref: 00478A1D
                                • __swprintf.LIBCMT ref: 00478A4B
                                • __swprintf.LIBCMT ref: 00478A79
                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                • __swprintf.LIBCMT ref: 00478AA7
                                • __swprintf.LIBCMT ref: 00478AD5
                                • __swprintf.LIBCMT ref: 00478B03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                • API String ID: 999945258-2428617273
                                • Opcode ID: 33ca009f61b1823efe27ce7fbc83c4a1f91168d01bfb6ca02cfa64ad04882b8b
                                • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                • Opcode Fuzzy Hash: 33ca009f61b1823efe27ce7fbc83c4a1f91168d01bfb6ca02cfa64ad04882b8b
                                • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                • __wsplitpath.LIBCMT ref: 00403492
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcscpy.LIBCMT ref: 004034A7
                                • _wcscat.LIBCMT ref: 004034BC
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                • _wcscpy.LIBCMT ref: 004035A0
                                • _wcslen.LIBCMT ref: 00403623
                                • _wcslen.LIBCMT ref: 0040367D
                                Strings
                                • Unterminated string, xrefs: 00428348
                                • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                • Error opening the file, xrefs: 00428231
                                • _, xrefs: 0040371C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                • API String ID: 3393021363-188983378
                                • Opcode ID: 13546e855ced177df9d08eb6622d477a0e12ee8f3dbf186e63f137870470a889
                                • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                • Opcode Fuzzy Hash: 13546e855ced177df9d08eb6622d477a0e12ee8f3dbf186e63f137870470a889
                                • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                • FindClose.KERNEL32(00000000), ref: 00431B20
                                • FindClose.KERNEL32(00000000), ref: 00431B34
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                • FindClose.KERNEL32(00000000), ref: 00431BCD
                                • FindClose.KERNEL32(00000000), ref: 00431BDB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                • String ID: *.*
                                • API String ID: 1409584000-438819550
                                • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                • __swprintf.LIBCMT ref: 00431C2E
                                • _wcslen.LIBCMT ref: 00431C3A
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                • String ID: :$\$\??\%s
                                • API String ID: 2192556992-3457252023
                                • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 004722A2
                                • __swprintf.LIBCMT ref: 004722B9
                                • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FolderPath$LocalTime__swprintf
                                • String ID: %.3d
                                • API String ID: 3337348382-986655627
                                • Opcode ID: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
                                • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                • Opcode Fuzzy Hash: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
                                • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                • FindClose.KERNEL32(00000000), ref: 0044291C
                                • FindClose.KERNEL32(00000000), ref: 00442930
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                • FindClose.KERNEL32(00000000), ref: 004429D4
                                  • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                • FindClose.KERNEL32(00000000), ref: 004429E2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 2640511053-438819550
                                • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                • GetLastError.KERNEL32 ref: 00433414
                                • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                • String ID: SeShutdownPrivilege
                                • API String ID: 2938487562-3733053543
                                • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                APIs
                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                  • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                  • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                • GetLengthSid.ADVAPI32(?), ref: 00446241
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                • CopySid.ADVAPI32(00000000), ref: 00446271
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                • String ID:
                                • API String ID: 1255039815-0
                                • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                APIs
                                • __swprintf.LIBCMT ref: 00433073
                                • __swprintf.LIBCMT ref: 00433085
                                • __wcsicoll.LIBCMT ref: 00433092
                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                • LockResource.KERNEL32(00000000), ref: 004330CA
                                • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                • LockResource.KERNEL32(?), ref: 00433120
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                • String ID:
                                • API String ID: 1158019794-0
                                • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                • GetLastError.KERNEL32 ref: 0045D6BF
                                • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove$_strncmp
                                • String ID: @oH$\$^$h
                                • API String ID: 2175499884-3701065813
                                • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                • listen.WSOCK32(00000000,00000005), ref: 00465381
                                • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLast$closesocket$bindlistensocket
                                • String ID:
                                • API String ID: 540024437-0
                                • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                • API String ID: 0-2872873767
                                • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                • __wsplitpath.LIBCMT ref: 00475644
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcscat.LIBCMT ref: 00475657
                                • __wcsicoll.LIBCMT ref: 0047567B
                                • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                • String ID:
                                • API String ID: 2547909840-0
                                • Opcode ID: fc0250626c1efa9facba16d15e34902531e163e2188b0a3c1cefa152461e97da
                                • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                • Opcode Fuzzy Hash: fc0250626c1efa9facba16d15e34902531e163e2188b0a3c1cefa152461e97da
                                • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                • Sleep.KERNEL32(0000000A), ref: 0045250B
                                • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                • FindClose.KERNEL32(?), ref: 004525FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                • String ID: *.*$\VH
                                • API String ID: 2786137511-2657498754
                                • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                • String ID: pqI
                                • API String ID: 2579439406-2459173057
                                • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                APIs
                                • __wcsicoll.LIBCMT ref: 00433349
                                • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                • __wcsicoll.LIBCMT ref: 00433375
                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicollmouse_event
                                • String ID: DOWN
                                • API String ID: 1033544147-711622031
                                • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044C3D2
                                • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: KeyboardMessagePostState$InputSend
                                • String ID:
                                • API String ID: 3031425849-0
                                • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                APIs
                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLastinet_addrsocket
                                • String ID:
                                • API String ID: 4170576061-0
                                • Opcode ID: e1e9af0f8610039617e1ec1dbf8547dd2259b58e47f92b4ee9a313e77e3e2229
                                • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                • Opcode Fuzzy Hash: e1e9af0f8610039617e1ec1dbf8547dd2259b58e47f92b4ee9a313e77e3e2229
                                • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                APIs
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • IsWindowVisible.USER32 ref: 0047A368
                                • IsWindowEnabled.USER32 ref: 0047A378
                                • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                • IsIconic.USER32 ref: 0047A393
                                • IsZoomed.USER32 ref: 0047A3A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                APIs
                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                • CoInitialize.OLE32(00000000), ref: 00478442
                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                • CoUninitialize.OLE32 ref: 0047863C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                • String ID: .lnk
                                • API String ID: 886957087-24824748
                                • Opcode ID: c0c94a5dc846cf603c69a0434ee64423c07e179b8cc5f03780b1d50ab2ca90aa
                                • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                • Opcode Fuzzy Hash: c0c94a5dc846cf603c69a0434ee64423c07e179b8cc5f03780b1d50ab2ca90aa
                                • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                APIs
                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                • CloseClipboard.USER32 ref: 0046DD0D
                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                • CloseClipboard.USER32 ref: 0046DD41
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                • CloseClipboard.USER32 ref: 0046DD99
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                • String ID:
                                • API String ID: 15083398-0
                                • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: U$\
                                • API String ID: 4104443479-100911408
                                • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Find$File$CloseFirstNext
                                • String ID:
                                • API String ID: 3541575487-0
                                • Opcode ID: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                • Opcode Fuzzy Hash: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                APIs
                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                • String ID:
                                • API String ID: 901099227-0
                                • Opcode ID: 3208e6ac78799f69c666fb0232cb4e221bc99da638f23659bce952dbbfaab925
                                • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                • Opcode Fuzzy Hash: 3208e6ac78799f69c666fb0232cb4e221bc99da638f23659bce952dbbfaab925
                                • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                APIs
                                • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Proc
                                • String ID:
                                • API String ID: 2346855178-0
                                • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                APIs
                                • BlockInput.USER32(00000001), ref: 0045A38B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: BlockInput
                                • String ID:
                                • API String ID: 3456056419-0
                                • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                APIs
                                • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: LogonUser
                                • String ID:
                                • API String ID: 1244722697-0
                                • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                APIs
                                • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: N@
                                • API String ID: 0-1509896676
                                • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                • Instruction ID: d113cc0b74813cf17c5ec52f86ab3661661cb83895ebc8433d7ba1bbd2b2dbdc
                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                • Instruction Fuzzy Hash: 3741C171D1051CEBCF48CFADC991AAEFBF2AF88201F548299D516AB345D730AB41DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                • Instruction ID: c229f66a4de275d5bde002ff7cb030acdb01f81aa5cf99c637a7a77dde60a0ab
                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                • Instruction Fuzzy Hash: 25019278A01109EFCB44DF98C5909AEF7B5FB48310F208599D809E7301E730AE41DB80
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                • Instruction ID: ddfae53c15a2199a406dfe4505b2c074cf0c152da10874f1ec381d624f203e30
                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                • Instruction Fuzzy Hash: 36019D78A01209EFCB45DF98C5909AEF7B6FB48310F208699E809E7301E731AE51DB80
                                Memory Dump Source
                                • Source File: 00000000.00000002.2802544949.0000000001770000.00000040.00001000.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1770000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                APIs
                                • DeleteObject.GDI32(?), ref: 0045953B
                                • DeleteObject.GDI32(?), ref: 00459551
                                • DestroyWindow.USER32(?), ref: 00459563
                                • GetDesktopWindow.USER32 ref: 00459581
                                • GetWindowRect.USER32(00000000), ref: 00459588
                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                • GetClientRect.USER32(00000000,?), ref: 004596F8
                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                • ShowWindow.USER32(?,00000004), ref: 00459865
                                • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                • GetStockObject.GDI32(00000011), ref: 004598CD
                                • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                • DeleteDC.GDI32(00000000), ref: 004598F8
                                • _wcslen.LIBCMT ref: 00459916
                                • _wcscpy.LIBCMT ref: 0045993A
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                • GetDC.USER32(00000000), ref: 004599FC
                                • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                • String ID: $AutoIt v3$DISPLAY$static
                                • API String ID: 4040870279-2373415609
                                • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                APIs
                                • GetSysColor.USER32(00000012), ref: 0044181E
                                • SetTextColor.GDI32(?,?), ref: 00441826
                                • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                • GetSysColor.USER32(0000000F), ref: 00441849
                                • SetBkColor.GDI32(?,?), ref: 00441864
                                • SelectObject.GDI32(?,?), ref: 00441874
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                • GetSysColor.USER32(00000010), ref: 004418B2
                                • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                • DeleteObject.GDI32(?), ref: 004418D5
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                • FillRect.USER32(?,?,?), ref: 00441970
                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                  • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                  • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                  • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                  • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                  • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                  • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                  • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                  • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                  • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                • String ID:
                                • API String ID: 69173610-0
                                • Opcode ID: c73d35dfd9becfff4496667be2a626b196f9f07a04c5aeadfea11702b13e807e
                                • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                • Opcode Fuzzy Hash: c73d35dfd9becfff4496667be2a626b196f9f07a04c5aeadfea11702b13e807e
                                • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                APIs
                                • DestroyWindow.USER32(?), ref: 004590F2
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                • GetClientRect.USER32(00000000,?), ref: 0045924E
                                • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                • GetStockObject.GDI32(00000011), ref: 004592AC
                                • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                • DeleteDC.GDI32(00000000), ref: 004592D6
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                • GetStockObject.GDI32(00000011), ref: 004593D3
                                • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                • API String ID: 2910397461-517079104
                                • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                • API String ID: 1038674560-3360698832
                                • Opcode ID: 948d6e735feee59fbc07cb26cb0fe892f0a7e63ff3e5ffa298f6c773137d2df0
                                • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                • Opcode Fuzzy Hash: 948d6e735feee59fbc07cb26cb0fe892f0a7e63ff3e5ffa298f6c773137d2df0
                                • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                APIs
                                • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                • SetCursor.USER32(00000000), ref: 0043075B
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                • SetCursor.USER32(00000000), ref: 00430773
                                • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                • SetCursor.USER32(00000000), ref: 0043078B
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                • SetCursor.USER32(00000000), ref: 004307A3
                                • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                • SetCursor.USER32(00000000), ref: 004307BB
                                • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                • SetCursor.USER32(00000000), ref: 004307D3
                                • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                • SetCursor.USER32(00000000), ref: 004307EB
                                • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                • SetCursor.USER32(00000000), ref: 00430803
                                • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                • SetCursor.USER32(00000000), ref: 0043081B
                                • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                • SetCursor.USER32(00000000), ref: 00430833
                                • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                • SetCursor.USER32(00000000), ref: 0043084B
                                • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                • SetCursor.USER32(00000000), ref: 00430863
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                • SetCursor.USER32(00000000), ref: 0043087B
                                • SetCursor.USER32(00000000), ref: 00430887
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                • SetCursor.USER32(00000000), ref: 0043089F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Cursor$Load
                                • String ID:
                                • API String ID: 1675784387-0
                                • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                APIs
                                • GetSysColor.USER32(0000000E), ref: 00430913
                                • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                • GetSysColor.USER32(00000012), ref: 00430933
                                • SetTextColor.GDI32(?,?), ref: 0043093B
                                • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                • GetSysColor.USER32(0000000F), ref: 00430959
                                • CreateSolidBrush.GDI32(?), ref: 00430962
                                • GetSysColor.USER32(00000011), ref: 00430979
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                • SelectObject.GDI32(?,00000000), ref: 0043099C
                                • SetBkColor.GDI32(?,?), ref: 004309A6
                                • SelectObject.GDI32(?,?), ref: 004309B4
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                • DrawFocusRect.USER32(?,?), ref: 00430A91
                                • GetSysColor.USER32(00000011), ref: 00430A9F
                                • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                • SelectObject.GDI32(?,?), ref: 00430AD0
                                • DeleteObject.GDI32(00000105), ref: 00430ADC
                                • SelectObject.GDI32(?,?), ref: 00430AE3
                                • DeleteObject.GDI32(?), ref: 00430AE9
                                • SetTextColor.GDI32(?,?), ref: 00430AF0
                                • SetBkColor.GDI32(?,?), ref: 00430AFB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID:
                                • API String ID: 1582027408-0
                                • Opcode ID: 1e88348ea3a7bdbc9c1884c5398ec3fc84ba76d6ffd2c367f7e2bd54d54e2b35
                                • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                • Opcode Fuzzy Hash: 1e88348ea3a7bdbc9c1884c5398ec3fc84ba76d6ffd2c367f7e2bd54d54e2b35
                                • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CloseConnectCreateRegistry
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 3217815495-966354055
                                • Opcode ID: ac2920d8b345c1dedb3493e3793d453c3a46fb4a1ef7edb4aa87b8d63c2a4590
                                • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                • Opcode Fuzzy Hash: ac2920d8b345c1dedb3493e3793d453c3a46fb4a1ef7edb4aa87b8d63c2a4590
                                • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                APIs
                                • GetCursorPos.USER32(?), ref: 004566AE
                                • GetDesktopWindow.USER32 ref: 004566C3
                                • GetWindowRect.USER32(00000000), ref: 004566CA
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                • DestroyWindow.USER32(?), ref: 00456746
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                • IsWindowVisible.USER32(?), ref: 0045682C
                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                • GetWindowRect.USER32(?,?), ref: 00456873
                                • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                • CopyRect.USER32(?,?), ref: 004568BE
                                • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                • String ID: ($,$tooltips_class32
                                • API String ID: 225202481-3320066284
                                • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                APIs
                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                • CloseClipboard.USER32 ref: 0046DD0D
                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                • CloseClipboard.USER32 ref: 0046DD41
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                • CloseClipboard.USER32 ref: 0046DD99
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                • String ID:
                                • API String ID: 15083398-0
                                • Opcode ID: c1334997229f77db4b11d19c1487f326394a263a26d39f21c0988453c07de84a
                                • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                • Opcode Fuzzy Hash: c1334997229f77db4b11d19c1487f326394a263a26d39f21c0988453c07de84a
                                • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetWindowRect.USER32(?,?), ref: 00471CF7
                                • GetClientRect.USER32(?,?), ref: 00471D05
                                • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                • GetClientRect.USER32(?,?), ref: 00471E8A
                                • GetStockObject.GDI32(00000011), ref: 00471EA6
                                • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                • String ID: @$AutoIt v3 GUI
                                • API String ID: 867697134-3359773793
                                • Opcode ID: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                • Opcode Fuzzy Hash: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                • API String ID: 1503153545-1459072770
                                • Opcode ID: 253f836fe704709940038014e64919ce78c9f917ef49ddb548c61840758a525e
                                • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                • Opcode Fuzzy Hash: 253f836fe704709940038014e64919ce78c9f917ef49ddb548c61840758a525e
                                • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll$__wcsnicmp
                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                • API String ID: 790654849-32604322
                                • Opcode ID: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
                                • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                • Opcode Fuzzy Hash: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
                                • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 783bae401eef8fea6a8092bc1d9d3b2d439adcaf51a75a301447225ee7ebac3f
                                • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                • Opcode Fuzzy Hash: 783bae401eef8fea6a8092bc1d9d3b2d439adcaf51a75a301447225ee7ebac3f
                                • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window
                                • String ID: 0
                                • API String ID: 2353593579-4108050209
                                • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                APIs
                                • GetSysColor.USER32(0000000F), ref: 0044A05E
                                • GetClientRect.USER32(?,?), ref: 0044A0D1
                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                • GetWindowDC.USER32(?), ref: 0044A0F6
                                • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                • ReleaseDC.USER32(?,?), ref: 0044A11B
                                • GetSysColor.USER32(0000000F), ref: 0044A131
                                • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                • GetSysColor.USER32(0000000F), ref: 0044A14F
                                • GetSysColor.USER32(00000005), ref: 0044A15B
                                • GetWindowDC.USER32(?), ref: 0044A1BE
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                • GetSysColor.USER32(00000008), ref: 0044A265
                                • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                • GetStockObject.GDI32(00000005), ref: 0044A28A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                • String ID:
                                • API String ID: 1744303182-0
                                • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                • __mtterm.LIBCMT ref: 00417C34
                                  • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                  • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                • __init_pointers.LIBCMT ref: 00417CE6
                                • __calloc_crt.LIBCMT ref: 00417D54
                                • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                • API String ID: 4163708885-3819984048
                                • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll$IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2485277191-404129466
                                • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                APIs
                                • LoadIconW.USER32(?,00000063), ref: 0045464C
                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                • SetWindowTextW.USER32(?,?), ref: 00454678
                                • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                • GetWindowRect.USER32(?,?), ref: 004546F5
                                • SetWindowTextW.USER32(?,?), ref: 00454765
                                • GetDesktopWindow.USER32 ref: 0045476F
                                • GetWindowRect.USER32(00000000), ref: 00454776
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                • GetClientRect.USER32(?,?), ref: 004547D2
                                • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                • String ID:
                                • API String ID: 3869813825-0
                                • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                APIs
                                • _wcslen.LIBCMT ref: 00464B28
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                • _wcslen.LIBCMT ref: 00464C28
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                • _wcslen.LIBCMT ref: 00464CBA
                                • _wcslen.LIBCMT ref: 00464CD0
                                • _wcslen.LIBCMT ref: 00464CEF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$Directory$CurrentSystem
                                • String ID: D
                                • API String ID: 1914653954-2746444292
                                • Opcode ID: 6948ea369263769dfbbdd0bc3d9a1ad7f197c715a9c3f0c388486b479e1a48b1
                                • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                • Opcode Fuzzy Hash: 6948ea369263769dfbbdd0bc3d9a1ad7f197c715a9c3f0c388486b479e1a48b1
                                • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll
                                • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                • API String ID: 3832890014-4202584635
                                • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                APIs
                                • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                • GetFocus.USER32 ref: 0046A0DD
                                • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessagePost$CtrlFocus
                                • String ID: 0
                                • API String ID: 1534620443-4108050209
                                • Opcode ID: 1fa00967610592ac8698c169706cdf66a9b64ebe627532ebd523634297a90e8c
                                • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                • Opcode Fuzzy Hash: 1fa00967610592ac8698c169706cdf66a9b64ebe627532ebd523634297a90e8c
                                • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                APIs
                                • DestroyWindow.USER32(?), ref: 004558E3
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$CreateDestroy
                                • String ID: ,$tooltips_class32
                                • API String ID: 1109047481-3856767331
                                • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                APIs
                                • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                • GetMenuItemCount.USER32(?), ref: 00468C45
                                • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                • GetMenuItemCount.USER32 ref: 00468CFD
                                • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                • GetCursorPos.USER32(?), ref: 00468D3F
                                • SetForegroundWindow.USER32(?), ref: 00468D49
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                • String ID: 0
                                • API String ID: 1441871840-4108050209
                                • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                • __swprintf.LIBCMT ref: 00460915
                                • __swprintf.LIBCMT ref: 0046092D
                                • _wprintf.LIBCMT ref: 004609E1
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                • API String ID: 3631882475-2268648507
                                • Opcode ID: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
                                • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                • Opcode Fuzzy Hash: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
                                • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                APIs
                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                • SendMessageW.USER32 ref: 00471740
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                • SendMessageW.USER32 ref: 0047184F
                                • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                • String ID:
                                • API String ID: 4116747274-0
                                • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                • _wcslen.LIBCMT ref: 00461683
                                • __swprintf.LIBCMT ref: 00461721
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                • GetDlgCtrlID.USER32(?), ref: 00461869
                                • GetWindowRect.USER32(?,?), ref: 004618A4
                                • GetParent.USER32(?), ref: 004618C3
                                • ScreenToClient.USER32(00000000), ref: 004618CA
                                • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                • String ID: %s%u
                                • API String ID: 1899580136-679674701
                                • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                APIs
                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: InfoItemMenu$Sleep
                                • String ID: 0
                                • API String ID: 1196289194-4108050209
                                • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                APIs
                                • GetDC.USER32(00000000), ref: 0043143E
                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                • SelectObject.GDI32(00000000,?), ref: 00431466
                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                • String ID: (
                                • API String ID: 3300687185-3887548279
                                • Opcode ID: 4bb044719e019256bb8c654ce64b9a0be835282368fba52bd33b0cc59a1cb33d
                                • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                • Opcode Fuzzy Hash: 4bb044719e019256bb8c654ce64b9a0be835282368fba52bd33b0cc59a1cb33d
                                • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                APIs
                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 1976180769-4113822522
                                • Opcode ID: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
                                • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                • Opcode Fuzzy Hash: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
                                • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                • String ID:
                                • API String ID: 461458858-0
                                • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                APIs
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                • CloseHandle.KERNEL32(00000000), ref: 00430113
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                • GlobalFree.KERNEL32(00000000), ref: 00430150
                                • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                • DeleteObject.GDI32(?), ref: 004301D0
                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                • String ID:
                                • API String ID: 3969911579-0
                                • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                • String ID: 0
                                • API String ID: 956284711-4108050209
                                • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 1965227024-3771769585
                                • Opcode ID: 8318520ae9f2cd43bfd62486a35e14c9bd394ae019e82845aa20be66315d65b3
                                • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                • Opcode Fuzzy Hash: 8318520ae9f2cd43bfd62486a35e14c9bd394ae019e82845aa20be66315d65b3
                                • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: SendString$_memmove_wcslen
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 369157077-1007645807
                                • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                APIs
                                • GetParent.USER32 ref: 00445BF8
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                • __wcsicoll.LIBCMT ref: 00445C33
                                • __wcsicoll.LIBCMT ref: 00445C4F
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll$ClassMessageNameParentSend
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 3125838495-3381328864
                                • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                APIs
                                • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$CharNext
                                • String ID:
                                • API String ID: 1350042424-0
                                • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                APIs
                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                • _wcscpy.LIBCMT ref: 004787E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 3052893215-2127371420
                                • Opcode ID: 1495cfa47c4d1db6875dc13c65e028fb744963613e64a49853f79430735fc339
                                • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                • Opcode Fuzzy Hash: 1495cfa47c4d1db6875dc13c65e028fb744963613e64a49853f79430735fc339
                                • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                APIs
                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                • __swprintf.LIBCMT ref: 0045E7F7
                                • _wprintf.LIBCMT ref: 0045E8B3
                                • _wprintf.LIBCMT ref: 0045E8D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2295938435-2354261254
                                • Opcode ID: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
                                • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                • Opcode Fuzzy Hash: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
                                • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __swprintf_wcscpy$__i64tow__itow
                                • String ID: %.15g$0x%p$False$True
                                • API String ID: 3038501623-2263619337
                                • Opcode ID: 7c2ba3e93f6e187abe82f1a0be8401819a0de5ad6c6c88cf9607a7e1b918f2d9
                                • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                • Opcode Fuzzy Hash: 7c2ba3e93f6e187abe82f1a0be8401819a0de5ad6c6c88cf9607a7e1b918f2d9
                                • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                APIs
                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                • __swprintf.LIBCMT ref: 0045E5F6
                                • _wprintf.LIBCMT ref: 0045E6A3
                                • _wprintf.LIBCMT ref: 0045E6C7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2295938435-8599901
                                • Opcode ID: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
                                • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                • Opcode Fuzzy Hash: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
                                • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                APIs
                                • timeGetTime.WINMM ref: 00443B67
                                  • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                • IsWindow.USER32(00000000), ref: 00443C3A
                                • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                • String ID: BUTTON
                                • API String ID: 1834419854-3405671355
                                • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                • LoadStringW.USER32(00000000), ref: 00454040
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • _wprintf.LIBCMT ref: 00454074
                                • __swprintf.LIBCMT ref: 004540A3
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                • API String ID: 455036304-4153970271
                                • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                APIs
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                • _memmove.LIBCMT ref: 00467EB8
                                • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                • _memmove.LIBCMT ref: 00467F6C
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                • String ID:
                                • API String ID: 2170234536-0
                                • Opcode ID: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                • Opcode Fuzzy Hash: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00453CE0
                                • SetKeyboardState.USER32(?), ref: 00453D3B
                                • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                • GetKeyState.USER32(000000A0), ref: 00453D75
                                • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                • GetKeyState.USER32(000000A1), ref: 00453DB5
                                • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                • GetKeyState.USER32(00000011), ref: 00453DEF
                                • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                • GetKeyState.USER32(00000012), ref: 00453E26
                                • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                • GetKeyState.USER32(0000005B), ref: 00453E5D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                APIs
                                • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                • DeleteObject.GDI32(?), ref: 0047151E
                                • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                • DeleteObject.GDI32(?), ref: 004715EA
                                • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                • String ID:
                                • API String ID: 3218148540-0
                                • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                • String ID:
                                • API String ID: 136442275-0
                                • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                APIs
                                • _wcsncpy.LIBCMT ref: 00467490
                                • _wcsncpy.LIBCMT ref: 004674BC
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • _wcstok.LIBCMT ref: 004674FF
                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                • _wcstok.LIBCMT ref: 004675B2
                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                • _wcslen.LIBCMT ref: 00467793
                                • _wcscpy.LIBCMT ref: 00467641
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcslen.LIBCMT ref: 004677BD
                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                • String ID: X
                                • API String ID: 3104067586-3081909835
                                • Opcode ID: 68b588145eb08d384b451c4f3930e6675fb60f77371eea53d807ec176a8c6779
                                • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                • Opcode Fuzzy Hash: 68b588145eb08d384b451c4f3930e6675fb60f77371eea53d807ec176a8c6779
                                • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                • _wcslen.LIBCMT ref: 0046CDB0
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                  • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                  • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                  • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                Strings
                                • NULL Pointer assignment, xrefs: 0046CEA6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                • String ID: NULL Pointer assignment
                                • API String ID: 440038798-2785691316
                                • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                APIs
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                • _wcslen.LIBCMT ref: 004610A3
                                • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                • GetWindowRect.USER32(?,?), ref: 00461248
                                  • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                • String ID: ThumbnailClass
                                • API String ID: 4136854206-1241985126
                                • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                APIs
                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                • GetClientRect.USER32(?,?), ref: 00471A1A
                                • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                • DestroyIcon.USER32(?), ref: 00471AF4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                • String ID: 2
                                • API String ID: 1331449709-450215437
                                • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                • __swprintf.LIBCMT ref: 00460915
                                • __swprintf.LIBCMT ref: 0046092D
                                • _wprintf.LIBCMT ref: 004609E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                • API String ID: 3054410614-2561132961
                                • Opcode ID: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
                                • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                • Opcode Fuzzy Hash: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
                                • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                • API String ID: 600699880-22481851
                                • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DestroyWindow
                                • String ID: static
                                • API String ID: 3375834691-2160076837
                                • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                • API String ID: 2907320926-3566645568
                                • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                APIs
                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                • DeleteObject.GDI32(005C0000), ref: 00470A04
                                • DestroyIcon.USER32(00730055), ref: 00470A1C
                                • DeleteObject.GDI32(EF64BD1F), ref: 00470A34
                                • DestroyWindow.USER32(0077006F), ref: 00470A4C
                                • DestroyIcon.USER32(?), ref: 00470A73
                                • DestroyIcon.USER32(?), ref: 00470A81
                                • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                • String ID:
                                • API String ID: 1237572874-0
                                • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                • VariantInit.OLEAUT32(?), ref: 004793E1
                                • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                • VariantClear.OLEAUT32(?), ref: 00479489
                                • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                • VariantClear.OLEAUT32(?), ref: 004794CA
                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044480E
                                • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                • GetKeyState.USER32(000000A0), ref: 004448AA
                                • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                • GetKeyState.USER32(000000A1), ref: 004448D9
                                • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                • GetKeyState.USER32(00000011), ref: 00444903
                                • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                • GetKeyState.USER32(00000012), ref: 0044492D
                                • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                • GetKeyState.USER32(0000005B), ref: 00444958
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: InitVariant$_malloc_wcscpy_wcslen
                                • String ID:
                                • API String ID: 3413494760-0
                                • Opcode ID: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                • Opcode Fuzzy Hash: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressProc_free_malloc$_strcat_strlen
                                • String ID: AU3_FreeVar
                                • API String ID: 2634073740-771828931
                                • Opcode ID: 550b8eae757193c414e0595c3745a5758a9af05cf674ca647bba299ebaa32496
                                • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                • Opcode Fuzzy Hash: 550b8eae757193c414e0595c3745a5758a9af05cf674ca647bba299ebaa32496
                                • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                APIs
                                • CoInitialize.OLE32 ref: 0046C63A
                                • CoUninitialize.OLE32 ref: 0046C645
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                  • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                • IIDFromString.OLE32(?,?), ref: 0046C705
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 2294789929-1287834457
                                • Opcode ID: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                • Opcode Fuzzy Hash: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                APIs
                                  • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                  • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                • ImageList_EndDrag.COMCTL32 ref: 00471169
                                • ReleaseCapture.USER32 ref: 0047116F
                                • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                • API String ID: 2483343779-2107944366
                                • Opcode ID: ab997791124da64b9ae6628faeb91ead5eed52e9edaa4de42759c36bd3468e4d
                                • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                • Opcode Fuzzy Hash: ab997791124da64b9ae6628faeb91ead5eed52e9edaa4de42759c36bd3468e4d
                                • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                • _wcslen.LIBCMT ref: 00450720
                                • _wcscat.LIBCMT ref: 00450733
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcscat_wcslen
                                • String ID: -----$SysListView32
                                • API String ID: 4008455318-3975388722
                                • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                • GetParent.USER32 ref: 00469C98
                                • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                • GetParent.USER32 ref: 00469CBC
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 2360848162-1403004172
                                • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                • String ID:
                                • API String ID: 262282135-0
                                • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow
                                • String ID:
                                • API String ID: 312131281-0
                                • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                APIs
                                  • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                • SendMessageW.USER32(76C223D0,00001001,00000000,?), ref: 00448E16
                                • SendMessageW.USER32(76C223D0,00001026,00000000,?), ref: 00448E25
                                  • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                • String ID:
                                • API String ID: 3771399671-0
                                • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00434643
                                • GetForegroundWindow.USER32(00000000), ref: 00434655
                                • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                • API String ID: 0-1603158881
                                • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                • DestroyWindow.USER32(?), ref: 00426F50
                                • UnregisterHotKey.USER32(?), ref: 00426F77
                                • FreeLibrary.KERNEL32(?), ref: 0042701F
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                • String ID: close all$Wu
                                • API String ID: 4174999648-1790509019
                                • Opcode ID: 8b8ef74a350061c675fcf49691a317b82446244048042cd995531152021aaf4b
                                • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                • Opcode Fuzzy Hash: 8b8ef74a350061c675fcf49691a317b82446244048042cd995531152021aaf4b
                                • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                APIs
                                • CreateMenu.USER32 ref: 00448603
                                • SetMenu.USER32(?,00000000), ref: 00448613
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                • IsMenu.USER32(?), ref: 004486AB
                                • CreatePopupMenu.USER32 ref: 004486B5
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                • DrawMenuBar.USER32 ref: 004486F5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                • String ID: 0
                                • API String ID: 161812096-4108050209
                                • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe), ref: 00434057
                                • LoadStringW.USER32(00000000), ref: 00434060
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                • LoadStringW.USER32(00000000), ref: 00434078
                                • _wprintf.LIBCMT ref: 004340A1
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                Strings
                                • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                • C:\Users\user\Desktop\LisectAVT_2403002A_107.exe, xrefs: 00434040
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message_wprintf
                                • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                                • API String ID: 3648134473-2561981141
                                • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33ff70d15d42cceee05355c1344f7f33e959cc1110d0211284453ea421210b4a
                                • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                • Opcode Fuzzy Hash: 33ff70d15d42cceee05355c1344f7f33e959cc1110d0211284453ea421210b4a
                                • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                APIs
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,0040F545,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,004A90E8,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,?,0040F545), ref: 0041013C
                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                • MoveFileW.KERNEL32(?,?), ref: 00453932
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                • String ID:
                                • API String ID: 978794511-0
                                • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove$_memcmp
                                • String ID: '$\$h
                                • API String ID: 2205784470-1303700344
                                • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                APIs
                                • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                • VariantClear.OLEAUT32 ref: 0045EA6D
                                • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                • __swprintf.LIBCMT ref: 0045EC33
                                • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                Strings
                                • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                • String ID: %4d%02d%02d%02d%02d%02d
                                • API String ID: 2441338619-1568723262
                                • Opcode ID: f9b12c6c80ec8889feb788a7d1b3a6e17281409cf429e3a552484053d85ff8f5
                                • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                • Opcode Fuzzy Hash: f9b12c6c80ec8889feb788a7d1b3a6e17281409cf429e3a552484053d85ff8f5
                                • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                APIs
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Interlocked$DecrementIncrement$Sleep
                                • String ID: @COM_EVENTOBJ
                                • API String ID: 327565842-2228938565
                                • Opcode ID: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                • Opcode Fuzzy Hash: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                APIs
                                • VariantClear.OLEAUT32(?), ref: 0047031B
                                • VariantClear.OLEAUT32(?), ref: 0047044F
                                • VariantInit.OLEAUT32(?), ref: 004704A3
                                • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                • VariantClear.OLEAUT32(?), ref: 00470516
                                  • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                  • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$Clear$Copy$CallDispFuncInit
                                • String ID: H
                                • API String ID: 3613100350-2852464175
                                • Opcode ID: 52c7664169eaa292332fe023f2c2bc33d552a7470d8d2829b5c49edb44fb0cff
                                • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                • Opcode Fuzzy Hash: 52c7664169eaa292332fe023f2c2bc33d552a7470d8d2829b5c49edb44fb0cff
                                • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                • String ID:
                                • API String ID: 1291720006-3916222277
                                • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                APIs
                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                • IsMenu.USER32(?), ref: 0045FC5F
                                • CreatePopupMenu.USER32 ref: 0045FC97
                                • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                • String ID: 0$2
                                • API String ID: 93392585-3793063076
                                • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                APIs
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                • VariantClear.OLEAUT32(?), ref: 00435320
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                • VariantClear.OLEAUT32(?), ref: 004353B3
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                • String ID: crts
                                • API String ID: 586820018-3724388283
                                • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                APIs
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,0040F545,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,004A90E8,C:\Users\user\Desktop\LisectAVT_2403002A_107.exe,?,0040F545), ref: 0041013C
                                • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                • _wcscat.LIBCMT ref: 0044BCAF
                                • _wcslen.LIBCMT ref: 0044BCBB
                                • _wcslen.LIBCMT ref: 0044BCD1
                                • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                • String ID: \*.*
                                • API String ID: 2326526234-1173974218
                                • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                APIs
                                  • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                • _wcslen.LIBCMT ref: 004335F2
                                • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                • GetLastError.KERNEL32 ref: 0043362B
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                • _wcsrchr.LIBCMT ref: 00433666
                                  • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                • String ID: \
                                • API String ID: 321622961-2967466578
                                • Opcode ID: da10d5b78ab5ad1c3cc995280c8e8dba532fda9b0d05ccef663218f6194e333a
                                • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                • Opcode Fuzzy Hash: da10d5b78ab5ad1c3cc995280c8e8dba532fda9b0d05ccef663218f6194e333a
                                • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                • API String ID: 1038674560-2734436370
                                • Opcode ID: ccaaf4387d553228faa77252550e52fa7d5bfe780cc94fa2d8ad27282aabdf6b
                                • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                • Opcode Fuzzy Hash: ccaaf4387d553228faa77252550e52fa7d5bfe780cc94fa2d8ad27282aabdf6b
                                • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                • __lock.LIBCMT ref: 00417981
                                  • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                  • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                  • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                • __lock.LIBCMT ref: 004179A2
                                • ___addlocaleref.LIBCMT ref: 004179C0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                • String ID: KERNEL32.DLL$pI
                                • API String ID: 637971194-197072765
                                • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove$_malloc
                                • String ID:
                                • API String ID: 1938898002-0
                                • Opcode ID: 302b5b53f799260f9ce9b28206203cc7915e7271a62840af8854100603816a52
                                • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                • Opcode Fuzzy Hash: 302b5b53f799260f9ce9b28206203cc7915e7271a62840af8854100603816a52
                                • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                • _memmove.LIBCMT ref: 0044B555
                                • _memmove.LIBCMT ref: 0044B578
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                • String ID:
                                • API String ID: 2737351978-0
                                • Opcode ID: 7ab42f6fd55acd480d0beaa690dfefcf933bf74ead23441932a4c988a673a664
                                • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                • Opcode Fuzzy Hash: 7ab42f6fd55acd480d0beaa690dfefcf933bf74ead23441932a4c988a673a664
                                • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                • __calloc_crt.LIBCMT ref: 00415246
                                • __getptd.LIBCMT ref: 00415253
                                • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                • _free.LIBCMT ref: 0041529E
                                • __dosmaperr.LIBCMT ref: 004152A9
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                • String ID:
                                • API String ID: 3638380555-0
                                • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0046C96E
                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$Copy$ClearErrorInitLast
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                • API String ID: 3207048006-625585964
                                • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                • gethostbyname.WSOCK32(?), ref: 004655A6
                                • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                • _memmove.LIBCMT ref: 004656CA
                                • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                • WSACleanup.WSOCK32 ref: 00465762
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                • String ID:
                                • API String ID: 2945290962-0
                                • Opcode ID: 861621b3bc9d23e299d0c06e3d54db9a70791c433b129c8d2c46b05cd3269fa8
                                • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                • Opcode Fuzzy Hash: 861621b3bc9d23e299d0c06e3d54db9a70791c433b129c8d2c46b05cd3269fa8
                                • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                APIs
                                • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                • String ID:
                                • API String ID: 1457242333-0
                                • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ConnectRegistry_memmove_wcslen
                                • String ID:
                                • API String ID: 15295421-0
                                • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcstok.LIBCMT ref: 004675B2
                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                • _wcscpy.LIBCMT ref: 00467641
                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                • _wcslen.LIBCMT ref: 00467793
                                • _wcslen.LIBCMT ref: 004677BD
                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                • String ID: X
                                • API String ID: 780548581-3081909835
                                • Opcode ID: 32eb5dd5382be4a99af9a34ee5e74afc5b8082b191b4c548fe1360af11c70918
                                • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                • Opcode Fuzzy Hash: 32eb5dd5382be4a99af9a34ee5e74afc5b8082b191b4c548fe1360af11c70918
                                • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                • CloseFigure.GDI32(?), ref: 0044751F
                                • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                • String ID:
                                • API String ID: 4082120231-0
                                • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                • String ID:
                                • API String ID: 2027346449-0
                                • Opcode ID: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                • Opcode Fuzzy Hash: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • GetMenu.USER32 ref: 0047A703
                                • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                • _wcslen.LIBCMT ref: 0047A79E
                                • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                • String ID:
                                • API String ID: 3257027151-0
                                • Opcode ID: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                • Opcode Fuzzy Hash: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                APIs
                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLastselect
                                • String ID:
                                • API String ID: 215497628-0
                                • Opcode ID: 88b8cb4817ec4dea3bf62034b11ea8d0bcea4ace5b519a732b41aca9dfd4df46
                                • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                • Opcode Fuzzy Hash: 88b8cb4817ec4dea3bf62034b11ea8d0bcea4ace5b519a732b41aca9dfd4df46
                                • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                APIs
                                • GetParent.USER32(?), ref: 0044443B
                                • GetKeyboardState.USER32(?), ref: 00444450
                                • SetKeyboardState.USER32(?), ref: 004444A4
                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                APIs
                                • GetParent.USER32(?), ref: 00444633
                                • GetKeyboardState.USER32(?), ref: 00444648
                                • SetKeyboardState.USER32(?), ref: 0044469C
                                • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                APIs
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                • String ID:
                                • API String ID: 2354583917-0
                                • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                APIs
                                • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressProc$Library$FreeLoad
                                • String ID: Wu
                                • API String ID: 2449869053-4083010176
                                • Opcode ID: edca6472ef0d27ee7e2f9b628ab7156cf8e4f7811a7febfc4905c6c59bc609c9
                                • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                • Opcode Fuzzy Hash: edca6472ef0d27ee7e2f9b628ab7156cf8e4f7811a7febfc4905c6c59bc609c9
                                • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                APIs
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$MessageMoveSend
                                • String ID:
                                • API String ID: 896007046-0
                                • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                APIs
                                • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                • GetFocus.USER32 ref: 00448ACF
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$FocusMessageSend
                                • String ID:
                                • API String ID: 3429747543-0
                                • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                APIs
                                  • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                  • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                  • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                • String ID:
                                • API String ID: 3300667738-0
                                • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                • __swprintf.LIBCMT ref: 0045D4E9
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume__swprintf
                                • String ID: %lu$\VH
                                • API String ID: 3164766367-2432546070
                                • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                APIs
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Msctls_Progress32
                                • API String ID: 3850602802-3636473452
                                • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                • String ID:
                                • API String ID: 3985565216-0
                                • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                APIs
                                • _malloc.LIBCMT ref: 0041F707
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • _free.LIBCMT ref: 0041F71A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AllocateHeap_free_malloc
                                • String ID: [B
                                • API String ID: 1020059152-632041663
                                • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                • __calloc_crt.LIBCMT ref: 00413DB0
                                • __getptd.LIBCMT ref: 00413DBD
                                • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                • _free.LIBCMT ref: 00413E07
                                • __dosmaperr.LIBCMT ref: 00413E12
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                • String ID:
                                • API String ID: 155776804-0
                                • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                APIs
                                  • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                  • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                • ExitThread.KERNEL32 ref: 00413D4E
                                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                • __freefls@4.LIBCMT ref: 00413D74
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                • String ID:
                                • API String ID: 259663610-0
                                • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                APIs
                                • GetClientRect.USER32(?,?), ref: 004302E6
                                • GetWindowRect.USER32(00000000,?), ref: 00430316
                                • GetClientRect.USER32(?,?), ref: 00430364
                                • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                • GetWindowRect.USER32(?,?), ref: 004303C3
                                • ScreenToClient.USER32(?,?), ref: 004303EC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Rect$Client$Window$MetricsScreenSystem
                                • String ID:
                                • API String ID: 3220332590-0
                                • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _malloc_wcslen$_strcat_wcscpy
                                • String ID:
                                • API String ID: 1612042205-0
                                • Opcode ID: 01cda919bcaeda96fc68f3269f6ace356965f649dc680818a637d0e57c7f240f
                                • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                • Opcode Fuzzy Hash: 01cda919bcaeda96fc68f3269f6ace356965f649dc680818a637d0e57c7f240f
                                • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove_strncmp
                                • String ID: >$U$\
                                • API String ID: 2666721431-237099441
                                • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044C570
                                • SetKeyboardState.USER32(00000080), ref: 0044C594
                                • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$InputSend
                                • String ID:
                                • API String ID: 2221674350-0
                                • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcscpy$_wcscat
                                • String ID:
                                • API String ID: 2037614760-0
                                • Opcode ID: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                • Opcode Fuzzy Hash: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                APIs
                                • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$Copy$AllocClearErrorLastString
                                • String ID:
                                • API String ID: 960795272-0
                                • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                APIs
                                • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                • EndPaint.USER32(?,?), ref: 00447D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                • String ID:
                                • API String ID: 4189319755-0
                                • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                APIs
                                • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow$InvalidateRect
                                • String ID:
                                • API String ID: 1976402638-0
                                • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                APIs
                                • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                • ShowWindow.USER32(?,00000000), ref: 00440B18
                                • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                • EnableWindow.USER32(?,00000001), ref: 00440B50
                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$Copy$ClearErrorLast
                                • String ID: NULL Pointer assignment$Not an Object type
                                • API String ID: 2487901850-572801152
                                • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                APIs
                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$MessageSend
                                • String ID:
                                • API String ID: 1871949834-0
                                • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                APIs
                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                • SendMessageW.USER32 ref: 00471AE3
                                • DestroyIcon.USER32(?), ref: 00471AF4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                • String ID:
                                • API String ID: 3611059338-0
                                • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DestroyWindow$DeleteObject$IconMove
                                • String ID:
                                • API String ID: 1640429340-0
                                • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • _wcslen.LIBCMT ref: 004438CD
                                • _wcslen.LIBCMT ref: 004438E6
                                • _wcstok.LIBCMT ref: 004438F8
                                • _wcslen.LIBCMT ref: 0044390C
                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                • _wcstok.LIBCMT ref: 00443931
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                • String ID:
                                • API String ID: 3632110297-0
                                • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteMenuObject$IconWindow
                                • String ID:
                                • API String ID: 752480666-0
                                • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                • String ID:
                                • API String ID: 3275902921-0
                                • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                • String ID:
                                • API String ID: 3275902921-0
                                • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                APIs
                                • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                APIs
                                • SendMessageW.USER32 ref: 004555C7
                                • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                • String ID:
                                • API String ID: 3691411573-0
                                • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                • LineTo.GDI32(?,?,?), ref: 004472AC
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                • LineTo.GDI32(?,?,?), ref: 004472C6
                                • EndPath.GDI32(?), ref: 004472D6
                                • StrokePath.GDI32(?), ref: 004472E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                • String ID:
                                • API String ID: 372113273-0
                                • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                APIs
                                • GetDC.USER32(00000000), ref: 0044CC6D
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CapsDevice$Release
                                • String ID:
                                • API String ID: 1035833867-0
                                • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                APIs
                                • __getptd.LIBCMT ref: 0041708E
                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                • __amsg_exit.LIBCMT ref: 004170AE
                                • __lock.LIBCMT ref: 004170BE
                                • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                • _free.LIBCMT ref: 004170EE
                                • InterlockedIncrement.KERNEL32(009C2D18), ref: 00417106
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                • String ID:
                                • API String ID: 3470314060-0
                                • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                  • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                • ExitThread.KERNEL32 ref: 004151ED
                                • __freefls@4.LIBCMT ref: 00415209
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                • String ID:
                                • API String ID: 442100245-0
                                • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                • _wcslen.LIBCMT ref: 0045F94A
                                • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                • String ID: 0
                                • API String ID: 621800784-4108050209
                                • Opcode ID: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                • Opcode Fuzzy Hash: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SetErrorMode.KERNEL32 ref: 004781CE
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                • SetErrorMode.KERNEL32(?), ref: 00478270
                                • SetErrorMode.KERNEL32(?), ref: 00478340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                • String ID: \VH
                                • API String ID: 3884216118-234962358
                                • Opcode ID: 5449acce0dfc5c79315eee781f2bdd37a4d184aa4b22928d0747396f6e1eb554
                                • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                • Opcode Fuzzy Hash: 5449acce0dfc5c79315eee781f2bdd37a4d184aa4b22928d0747396f6e1eb554
                                • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                APIs
                                • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: AU3_GetPluginDetails$Wu
                                • API String ID: 145871493-136108093
                                • Opcode ID: 1b967ec24c8390f3387778d718631ee145e19a9e332b79d0b02996b6373224c2
                                • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                • Opcode Fuzzy Hash: 1b967ec24c8390f3387778d718631ee145e19a9e332b79d0b02996b6373224c2
                                • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                APIs
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                • IsMenu.USER32(?), ref: 0044854D
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                • DrawMenuBar.USER32 ref: 004485AF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$Item$DrawInfoInsert
                                • String ID: 0
                                • API String ID: 3076010158-4108050209
                                • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$_memmove_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 1589278365-1403004172
                                • Opcode ID: 84023084f268010a8c6e91c3b053e13d2896b439e89b5abfb34e3a5f41ab079a
                                • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                • Opcode Fuzzy Hash: 84023084f268010a8c6e91c3b053e13d2896b439e89b5abfb34e3a5f41ab079a
                                • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Handle
                                • String ID: nul
                                • API String ID: 2519475695-2873401336
                                • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Handle
                                • String ID: nul
                                • API String ID: 2519475695-2873401336
                                • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                APIs
                                • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcsncpy.LIBCMT ref: 00401C41
                                • _wcscpy.LIBCMT ref: 00401C5D
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                • String ID: Line:
                                • API String ID: 1874344091-1585850449
                                • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: SysAnimate32
                                • API String ID: 0-1011021900
                                • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                  • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                  • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                  • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                  • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                • GetFocus.USER32 ref: 0046157B
                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                • __swprintf.LIBCMT ref: 00461608
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                • String ID: %s%d
                                • API String ID: 2645982514-1110647743
                                • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                APIs
                                • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process$CloseCountersCurrentHandleOpen
                                • String ID:
                                • API String ID: 3488606520-0
                                • Opcode ID: eb0ee623be0d652077323ef2e5287e2f759435c14be6d9e4c6e8d411cffc87c2
                                • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                • Opcode Fuzzy Hash: eb0ee623be0d652077323ef2e5287e2f759435c14be6d9e4c6e8d411cffc87c2
                                • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ConnectRegistry_memmove_wcslen
                                • String ID:
                                • API String ID: 15295421-0
                                • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                APIs
                                • GetCursorPos.USER32(?), ref: 004563A6
                                • ScreenToClient.USER32(?,?), ref: 004563C3
                                • GetAsyncKeyState.USER32(?), ref: 00456400
                                • GetAsyncKeyState.USER32(?), ref: 00456410
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorLongScreenWindow
                                • String ID:
                                • API String ID: 3539004672-0
                                • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                APIs
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                • Sleep.KERNEL32(0000000A), ref: 0047D455
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Interlocked$DecrementIncrement$Sleep
                                • String ID:
                                • API String ID: 327565842-0
                                • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String
                                • String ID:
                                • API String ID: 2832842796-0
                                • Opcode ID: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                • Opcode Fuzzy Hash: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                APIs
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Enum$CloseDeleteOpen
                                • String ID:
                                • API String ID: 2095303065-0
                                • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00436A24
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: RectWindow
                                • String ID:
                                • API String ID: 861336768-0
                                • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                APIs
                                • SendMessageW.USER32 ref: 00449598
                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                • _wcslen.LIBCMT ref: 0044960D
                                • _wcslen.LIBCMT ref: 0044961A
                                • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$_wcslen$_wcspbrk
                                • String ID:
                                • API String ID: 1856069659-0
                                • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                APIs
                                • GetCursorPos.USER32(?), ref: 004478E2
                                • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                • GetCursorPos.USER32(00000000), ref: 0044796A
                                • TrackPopupMenuEx.USER32(009C63C0,00000000,00000000,?,?,00000000), ref: 00447991
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CursorMenuPopupTrack$Proc
                                • String ID:
                                • API String ID: 1300944170-0
                                • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                APIs
                                • GetClientRect.USER32(?,?), ref: 004479CC
                                • GetCursorPos.USER32(?), ref: 004479D7
                                • ScreenToClient.USER32(?,?), ref: 004479F3
                                • WindowFromPoint.USER32(?,?), ref: 00447A34
                                • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Client$CursorFromPointProcRectScreenWindow
                                • String ID:
                                • API String ID: 1822080540-0
                                • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                • EndPaint.USER32(?,?), ref: 00447D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ClientPaintRectRectangleScreenViewportWindow
                                • String ID:
                                • API String ID: 659298297-0
                                • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                APIs
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                  • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                  • Part of subcall function 00440D98: SendMessageW.USER32(009C1AF8,000000F1,00000000,00000000), ref: 00440E6E
                                  • Part of subcall function 00440D98: SendMessageW.USER32(009C1AF8,000000F1,00000001,00000000), ref: 00440E9A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$EnableMessageSend$LongShow
                                • String ID:
                                • API String ID: 142311417-0
                                • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00445879
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                • _wcslen.LIBCMT ref: 004458FB
                                • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                • String ID:
                                • API String ID: 3087257052-0
                                • Opcode ID: 9cb5a364ae722c52a7dbf79c417d66f25c1ac6eca2345acd985314f9d3f14cdb
                                • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                • Opcode Fuzzy Hash: 9cb5a364ae722c52a7dbf79c417d66f25c1ac6eca2345acd985314f9d3f14cdb
                                • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                APIs
                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                • String ID:
                                • API String ID: 245547762-0
                                • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 004471D8
                                • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • SelectObject.GDI32(?,00000000), ref: 00447228
                                • BeginPath.GDI32(?), ref: 0044723D
                                • SelectObject.GDI32(?,00000000), ref: 00447266
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Object$Select$BeginCreateDeletePath
                                • String ID:
                                • API String ID: 2338827641-0
                                • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00434598
                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                • Sleep.KERNEL32(00000000), ref: 004345D4
                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CounterPerformanceQuerySleep
                                • String ID:
                                • API String ID: 2875609808-0
                                • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                • MessageBeep.USER32(00000000), ref: 00460C46
                                • KillTimer.USER32(?,0000040A), ref: 00460C68
                                • EndDialog.USER32(?,00000001), ref: 00460C83
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$Icon
                                • String ID:
                                • API String ID: 4023252218-0
                                • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                APIs
                                • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DeleteDestroyObject$IconMessageSendWindow
                                • String ID:
                                • API String ID: 1489400265-0
                                • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                APIs
                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                • DestroyWindow.USER32(?), ref: 00455728
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                • String ID:
                                • API String ID: 1042038666-0
                                • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                APIs
                                • __getptd.LIBCMT ref: 0041780F
                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                • __getptd.LIBCMT ref: 00417826
                                • __amsg_exit.LIBCMT ref: 00417834
                                • __lock.LIBCMT ref: 00417844
                                • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                • String ID:
                                • API String ID: 938513278-0
                                • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                APIs
                                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                • ExitThread.KERNEL32 ref: 00413D4E
                                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                • __freefls@4.LIBCMT ref: 00413D74
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                • String ID:
                                • API String ID: 2403457894-0
                                • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                APIs
                                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                • ExitThread.KERNEL32 ref: 004151ED
                                • __freefls@4.LIBCMT ref: 00415209
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                • String ID:
                                • API String ID: 4247068974-0
                                • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID:
                                • String ID: )$U$\
                                • API String ID: 0-3705770531
                                • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                APIs
                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                • CoInitialize.OLE32(00000000), ref: 0046E505
                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                • CoUninitialize.OLE32 ref: 0046E53D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                • String ID: .lnk
                                • API String ID: 886957087-24824748
                                • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                Strings
                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                • API String ID: 708495834-557222456
                                • Opcode ID: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                • Opcode Fuzzy Hash: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                APIs
                                  • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                  • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                  • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                  • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                  • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                • String ID: @
                                • API String ID: 4150878124-2766056989
                                • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \$]$h
                                • API String ID: 4104443479-3262404753
                                • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                APIs
                                • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • CloseHandle.KERNEL32(?), ref: 00457E09
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                • String ID: <$@
                                • API String ID: 2417854910-1426351568
                                • Opcode ID: e9c73e3d2021d593aa3eeb5bcfad4dc549940308948f120500e660ea52915009
                                • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                • Opcode Fuzzy Hash: e9c73e3d2021d593aa3eeb5bcfad4dc549940308948f120500e660ea52915009
                                • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                APIs
                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                • String ID:
                                • API String ID: 3705125965-3916222277
                                • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                APIs
                                • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem
                                • String ID: 0
                                • API String ID: 135850232-4108050209
                                • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                APIs
                                • DestroyWindow.USER32(00000000), ref: 00450A2F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DestroyWindow
                                • String ID: msctls_updown32
                                • API String ID: 3375834691-2298589950
                                • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: $<
                                • API String ID: 4104443479-428540627
                                • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume
                                • String ID: \VH
                                • API String ID: 2507767853-234962358
                                • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume
                                • String ID: \VH
                                • API String ID: 2507767853-234962358
                                • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                • String ID: crts
                                • API String ID: 943502515-3724388283
                                • Opcode ID: 7cacbb21023c36386d724211ce0e7a2a91038d6de25e3edf4df7815685ba208d
                                • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                • Opcode Fuzzy Hash: 7cacbb21023c36386d724211ce0e7a2a91038d6de25e3edf4df7815685ba208d
                                • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorMode$LabelVolume
                                • String ID: \VH
                                • API String ID: 2006950084-234962358
                                • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetMenuItemInfoW.USER32 ref: 00449727
                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                • DrawMenuBar.USER32 ref: 00449761
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Menu$InfoItem$Draw_malloc
                                • String ID: 0
                                • API String ID: 772068139-4108050209
                                • Opcode ID: 0d7c8cb0593d90d0006b7f71eddb92c0c1bad4228f881c3d14c28ca9583336af
                                • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                • Opcode Fuzzy Hash: 0d7c8cb0593d90d0006b7f71eddb92c0c1bad4228f881c3d14c28ca9583336af
                                • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$_wcscpy
                                • String ID: 3, 3, 8, 1
                                • API String ID: 3469035223-357260408
                                • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpCloseHandle
                                • API String ID: 2574300362-3530519716
                                • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpCreateFile
                                • API String ID: 2574300362-275556492
                                • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpSendEcho
                                • API String ID: 2574300362-58917771
                                • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2574300362-4033151799
                                • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0047950F
                                • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                • VariantClear.OLEAUT32(?), ref: 00479650
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$AllocClearCopyInitString
                                • String ID:
                                • API String ID: 2808897238-0
                                • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                APIs
                                • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                • __itow.LIBCMT ref: 004699CD
                                  • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                • __itow.LIBCMT ref: 00469A97
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$__itow
                                • String ID:
                                • API String ID: 3379773720-0
                                • Opcode ID: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
                                • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                • Opcode Fuzzy Hash: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
                                • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00449A4A
                                • ScreenToClient.USER32(?,?), ref: 00449A80
                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID:
                                • API String ID: 3880355969-0
                                • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                APIs
                                • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                • GetWindowRect.USER32(?,?), ref: 00441722
                                • PtInRect.USER32(?,?,?), ref: 00441734
                                • MessageBeep.USER32(00000000), ref: 004417AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Rect$BeepClientMessageScreenWindow
                                • String ID:
                                • API String ID: 1352109105-0
                                • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                APIs
                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                • __isleadbyte_l.LIBCMT ref: 004208A6
                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                APIs
                                • GetParent.USER32(?), ref: 004503C8
                                • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Proc$Parent
                                • String ID:
                                • API String ID: 2351499541-0
                                • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                • TranslateMessage.USER32(?), ref: 00442B01
                                • DispatchMessageW.USER32(?), ref: 00442B0B
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Message$Peek$DispatchTranslate
                                • String ID:
                                • API String ID: 1795658109-0
                                • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                APIs
                                • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                • GetCaretPos.USER32(?), ref: 004743B2
                                • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                • GetForegroundWindow.USER32 ref: 004743EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: ce091ef814b5fafe322bd8092bb072d14f6e392412cfc1c0bbebd96ef42ae3d3
                                • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                • Opcode Fuzzy Hash: ce091ef814b5fafe322bd8092bb072d14f6e392412cfc1c0bbebd96ef42ae3d3
                                • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                APIs
                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                • _wcslen.LIBCMT ref: 00449519
                                • _wcslen.LIBCMT ref: 00449526
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend_wcslen$_wcspbrk
                                • String ID:
                                • API String ID: 2886238975-0
                                • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __setmode$DebugOutputString_fprintf
                                • String ID:
                                • API String ID: 1792727568-0
                                • Opcode ID: 5d4322aea4207270e306f71f31351bd3950e7b1fce0631062c9bba007b08485e
                                • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                • Opcode Fuzzy Hash: 5d4322aea4207270e306f71f31351bd3950e7b1fce0631062c9bba007b08485e
                                • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                APIs
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$Long$AttributesLayered
                                • String ID:
                                • API String ID: 2169480361-0
                                • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                APIs
                                  • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                  • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                  • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                • lstrlenW.KERNEL32(?), ref: 00434CF6
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen$_malloc
                                • String ID: cdecl
                                • API String ID: 3850814276-3896280584
                                • Opcode ID: afc65af1a5a2bb63f0eb84f5de85879a7d1b3c56df44b7375c6917846598466f
                                • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                • Opcode Fuzzy Hash: afc65af1a5a2bb63f0eb84f5de85879a7d1b3c56df44b7375c6917846598466f
                                • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                APIs
                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                • _memmove.LIBCMT ref: 0046D475
                                • inet_ntoa.WSOCK32(?), ref: 0046D481
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                • String ID:
                                • API String ID: 2502553879-0
                                • Opcode ID: 4777d02d04a30dcfdb085943b42a4ccb2e6b73bd431d008d3c99f42dcf393561
                                • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                • Opcode Fuzzy Hash: 4777d02d04a30dcfdb085943b42a4ccb2e6b73bd431d008d3c99f42dcf393561
                                • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                APIs
                                • SendMessageW.USER32 ref: 00448C69
                                • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow
                                • String ID:
                                • API String ID: 312131281-0
                                • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                APIs
                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLastacceptselect
                                • String ID:
                                • API String ID: 385091864-0
                                • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                • GetStockObject.GDI32(00000011), ref: 00430258
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Window$CreateMessageObjectSendShowStock
                                • String ID:
                                • API String ID: 1358664141-0
                                • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                • String ID:
                                • API String ID: 2880819207-0
                                • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00430BA2
                                • ScreenToClient.USER32(?,?), ref: 00430BC1
                                • ScreenToClient.USER32(?,?), ref: 00430BE2
                                • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ClientRectScreen$InvalidateWindow
                                • String ID:
                                • API String ID: 357397906-0
                                • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                APIs
                                • __wsplitpath.LIBCMT ref: 0043392E
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • __wsplitpath.LIBCMT ref: 00433950
                                • __wcsicoll.LIBCMT ref: 00433974
                                • __wcsicoll.LIBCMT ref: 0043398A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                • String ID:
                                • API String ID: 1187119602-0
                                • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcslen$_malloc_wcscat_wcscpy
                                • String ID:
                                • API String ID: 1597257046-0
                                • Opcode ID: 85e4adbaf347226b96d401885beb78bfeeb3cd93579cc1eb681b802d52671b45
                                • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                • Opcode Fuzzy Hash: 85e4adbaf347226b96d401885beb78bfeeb3cd93579cc1eb681b802d52671b45
                                • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                APIs
                                • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                • __malloc_crt.LIBCMT ref: 0041F5B6
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: EnvironmentStrings$Free__malloc_crt
                                • String ID:
                                • API String ID: 237123855-0
                                • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: DeleteDestroyObject$IconWindow
                                • String ID:
                                • API String ID: 3349847261-0
                                • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                APIs
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                • String ID:
                                • API String ID: 2223660684-0
                                • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                • LineTo.GDI32(?,?,?), ref: 00447326
                                • EndPath.GDI32(?), ref: 00447336
                                • StrokePath.GDI32(?), ref: 00447344
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                • String ID:
                                • API String ID: 2783949968-0
                                • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                APIs
                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                • AttachThreadInput.USER32(00000000), ref: 004364AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                • String ID:
                                • API String ID: 2710830443-0
                                • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                  • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                  • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                APIs
                                • GetDesktopWindow.USER32 ref: 00472B63
                                • GetDC.USER32(00000000), ref: 00472B6C
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                APIs
                                • GetDesktopWindow.USER32 ref: 00472BB2
                                • GetDC.USER32(00000000), ref: 00472BBB
                                • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                APIs
                                • __getptd_noexit.LIBCMT ref: 00415150
                                  • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                  • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                  • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                  • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                  • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                • __freeptd.LIBCMT ref: 0041516B
                                • ExitThread.KERNEL32 ref: 00415173
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                • String ID:
                                • API String ID: 1454798553-0
                                • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _strncmp
                                • String ID: Q\E
                                • API String ID: 909875538-2189900498
                                • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                APIs
                                • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                • String ID: AutoIt3GUI$Container
                                • API String ID: 2652923123-3941886329
                                • Opcode ID: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                • Opcode Fuzzy Hash: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove_strncmp
                                • String ID: U$\
                                • API String ID: 2666721431-100911408
                                • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • __wcsnicmp.LIBCMT ref: 00467288
                                • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                • String ID: LPT
                                • API String ID: 3035604524-1350329615
                                • Opcode ID: ed096543d1ec7c0345a30e4fa8b315170b62071b7239d1c6b0adffd9c8aa9f43
                                • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                • Opcode Fuzzy Hash: ed096543d1ec7c0345a30e4fa8b315170b62071b7239d1c6b0adffd9c8aa9f43
                                • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \$h
                                • API String ID: 4104443479-677774858
                                • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID: &
                                • API String ID: 2931989736-1010288
                                • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                APIs
                                • _wcslen.LIBCMT ref: 00466825
                                • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CrackInternet_wcslen
                                • String ID: |
                                • API String ID: 596671847-2343686810
                                • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                APIs
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: '
                                • API String ID: 3850602802-1997036262
                                • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                APIs
                                • _strlen.LIBCMT ref: 0040F858
                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                • _sprintf.LIBCMT ref: 0040F9AE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove$_sprintf_strlen
                                • String ID: %02X
                                • API String ID: 1921645428-436463671
                                • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00476CB0
                                • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: htonsinet_addr
                                • String ID: 255.255.255.255
                                • API String ID: 3832099526-2422070025
                                • Opcode ID: 336bf04b74032a76dffc0b3dec239f3a33009b0f842574d7a0c0b2a9c387c113
                                • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                • Opcode Fuzzy Hash: 336bf04b74032a76dffc0b3dec239f3a33009b0f842574d7a0c0b2a9c387c113
                                • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: InternetOpen
                                • String ID: <local>
                                • API String ID: 2038078732-4266983199
                                • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: u,D
                                • API String ID: 4104443479-3858472334
                                • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                APIs
                                • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • wsprintfW.USER32 ref: 0045612A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: MessageSend_mallocwsprintf
                                • String ID: %d/%02d/%02d
                                • API String ID: 1262938277-328681919
                                • Opcode ID: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                • Opcode Fuzzy Hash: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                APIs
                                • InternetCloseHandle.WININET(?), ref: 00442663
                                • InternetCloseHandle.WININET ref: 00442668
                                  • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: CloseHandleInternet$ObjectSingleWait
                                • String ID: aeB
                                • API String ID: 857135153-906807131
                                • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                APIs
                                Strings
                                • C:\Users\user\Desktop\LisectAVT_2403002A_107.exe, xrefs: 0043324B
                                • ^B, xrefs: 00433248
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: _wcsncpy
                                • String ID: ^B$C:\Users\user\Desktop\LisectAVT_2403002A_107.exe
                                • API String ID: 1735881322-2902525863
                                • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                • PostMessageW.USER32(00000000), ref: 00441C05
                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                APIs
                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                  • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2801587315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2801566811.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801713146.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801769704.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801787048.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801803970.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2801861994.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_107.jbxd
                                Similarity
                                • API ID: Message_doexit
                                • String ID: AutoIt$Error allocating memory.
                                • API String ID: 1993061046-4017498283
                                • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D