Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-A1702108.exe

Overview

General Information

Sample name:PO-A1702108.exe
Analysis ID:1513875
MD5:8a0bb862ed0acef45107d21e4735e8e1
SHA1:af9661b6eb2ca83be84d013ffcaaf750a38d6afe
SHA256:987b95ebff5f1b9e47105ea5c3d5fafc841b1fba94ae40630d956de2654ebdc6
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO-A1702108.exe (PID: 3568 cmdline: "C:\Users\user\Desktop\PO-A1702108.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
    • nonsubmerged.exe (PID: 1252 cmdline: "C:\Users\user\Desktop\PO-A1702108.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
      • RegSvcs.exe (PID: 3876 cmdline: "C:\Users\user\Desktop\PO-A1702108.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • nonsubmerged.exe (PID: 6548 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
        • RegSvcs.exe (PID: 2680 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • nonsubmerged.exe (PID: 5912 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
          • RegSvcs.exe (PID: 1164 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 5444 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • nonsubmerged.exe (PID: 1784 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
      • RegSvcs.exe (PID: 1200 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • nonsubmerged.exe (PID: 984 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 8A0BB862ED0ACEF45107D21E4735E8E1)
        • RegSvcs.exe (PID: 5972 cmdline: "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2127421711.00000000016A0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 41 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000009.00000002.2241407870.0000000003C50000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 41 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
0000000B.00000002.2254284355.0000000003C00000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 41 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      Click to see the 27 entries
      SourceRuleDescriptionAuthorStrings
      9.2.nonsubmerged.exe.3c50000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 41 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      7.2.RegSvcs.exe.4143590.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        7.2.RegSvcs.exe.4143590.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          7.2.RegSvcs.exe.4143590.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            7.2.RegSvcs.exe.4143590.5.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
            • 0x3dc11:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
            • 0x3dc83:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
            • 0x3dd0d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
            • 0x3dd9f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
            • 0x3de09:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
            • 0x3de7b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
            • 0x3df11:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
            • 0x3dfa1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
            Click to see the 66 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , ProcessId: 5444, ProcessName: wscript.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.54.122.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 1164, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs" , ProcessId: 5444, ProcessName: wscript.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe, ProcessId: 1252, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO-A1702108.exeAvira: detected
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAvira: detection malicious, Label: HEUR/AGEN.1321685
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeReversingLabs: Detection: 57%
            Source: PO-A1702108.exeReversingLabs: Detection: 57%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeJoe Sandbox ML: detected
            Source: PO-A1702108.exeJoe Sandbox ML: detected
            Source: PO-A1702108.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49706 version: TLS 1.2
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2255486571.0000000001091000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: nonsubmerged.exe, 00000002.00000003.2116189971.0000000004680000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000002.00000003.2116346139.0000000004820000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2124974326.0000000004800000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2125226631.0000000004660000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2136167856.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2141266997.0000000004630000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238714875.00000000048E0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238557587.0000000004740000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2249869546.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2248501737.0000000004860000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: nonsubmerged.exe, 00000002.00000003.2116189971.0000000004680000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000002.00000003.2116346139.0000000004820000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2124974326.0000000004800000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2125226631.0000000004660000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2136167856.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2141266997.0000000004630000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238714875.00000000048E0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238557587.0000000004740000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2249869546.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2248501737.0000000004860000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
            Source: global trafficTCP traffic: 192.168.2.5:49705 -> 198.54.122.135:587
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 198.54.122.135 198.54.122.135
            Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: global trafficTCP traffic: 192.168.2.5:49705 -> 198.54.122.135:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: mail.privateemail.com
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.000000000155E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
            Source: RegSvcs.exe, 00000007.00000002.2260012334.000000000316F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.000000000375F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.privateemail.com
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
            Source: RegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
            Source: RegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: RegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: RegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49706 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, SKTzxzsJw.cs.Net Code: mWXy4
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_0045A10F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,4_2_0045A10F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_0047C81C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_0047C81C

            System Summary

            barindex
            Source: 9.2.nonsubmerged.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 4.2.nonsubmerged.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 6.2.nonsubmerged.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 11.2.nonsubmerged.exe.3c00000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 2.2.nonsubmerged.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000004.00000002.2127421711.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000009.00000002.2241407870.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0000000B.00000002.2254284355.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 00000007.00000002.2254378671.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 00000002.00000002.2117946053.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000006.00000002.2145593123.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044EB590_2_0044EB59
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0427E6880_2_0427E688
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004096A02_2_004096A0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0042200C2_2_0042200C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0041A2172_2_0041A217
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004122162_2_00412216
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0042435D2_2_0042435D
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004033C02_2_004033C0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044F4302_2_0044F430
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004125E82_2_004125E8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044663B2_2_0044663B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004138012_2_00413801
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0042096F2_2_0042096F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004129D02_2_004129D0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004119E32_2_004119E3
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0041C9AE2_2_0041C9AE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0047EA6F2_2_0047EA6F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0040FA102_2_0040FA10
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044EB592_2_0044EB59
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00423C812_2_00423C81
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00411E782_2_00411E78
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00442E0C2_2_00442E0C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00420EC02_2_00420EC0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044CF172_2_0044CF17
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00444FD22_2_00444FD2
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_041576B82_2_041576B8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004096A04_2_004096A0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0042200C4_2_0042200C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0041A2174_2_0041A217
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004122164_2_00412216
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0042435D4_2_0042435D
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004033C04_2_004033C0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044F4304_2_0044F430
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004125E84_2_004125E8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044663B4_2_0044663B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004138014_2_00413801
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0042096F4_2_0042096F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004129D04_2_004129D0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004119E34_2_004119E3
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0041C9AE4_2_0041C9AE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0047EA6F4_2_0047EA6F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0040FA104_2_0040FA10
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044EB594_2_0044EB59
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00423C814_2_00423C81
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00411E784_2_00411E78
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00442E0C4_2_00442E0C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00420EC04_2_00420EC0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044CF174_2_0044CF17
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00444FD24_2_00444FD2
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_041507204_2_04150720
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 6_2_041166886_2_04116688
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00408C607_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040DC117_2_0040DC11
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00407C3F7_2_00407C3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00418CCC7_2_00418CCC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00406CA07_2_00406CA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004028B07_2_004028B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041A4BE7_2_0041A4BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004182447_2_00418244
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004016507_2_00401650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F207_2_00402F20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004193C47_2_004193C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004187887_2_00418788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F897_2_00402F89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402B907_2_00402B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004073A07_2_004073A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C1D0087_2_02C1D008
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C1DC207_2_02C1DC20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C112987_2_02C11298
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C1D3507_2_02C1D350
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C110307_2_02C11030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C995907_2_05C99590
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C9ECB07_2_05C9ECB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C9BBD87_2_05C9BBD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C95A507_2_05C95A50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C9F4107_2_05C9F410
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C900407_2_05C90040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C900067_2_05C90006
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05C962487_2_05C96248
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069E52487_2_069E5248
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069EA0F87_2_069EA0F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069E61D07_2_069E61D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069E86987_2_069E8698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_069E15407_2_069E1540
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 9_2_042326989_2_04232698
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 11_2_041A869811_2_041A8698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325D35012_2_0325D350
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325DC2012_2_0325DC20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325D00812_2_0325D008
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_03250FD012_2_03250FD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325103012_2_03251030
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628ECA012_2_0628ECA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628958012_2_06289580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628623812_2_06286238
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06285A4012_2_06285A40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628BBC812_2_0628BBC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628F40012_2_0628F400
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628000712_2_06280007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0628004012_2_06280040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB062012_2_06EB0620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB542012_2_06EB5420
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EBA2D812_2_06EBA2D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB63A812_2_06EB63A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB171812_2_06EB1718
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB887012_2_06EB8870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 0040E710 appears 44 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 00401B10 appears 50 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 00408F40 appears 42 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 004301F8 appears 36 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 004115D7 appears 72 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 00416C70 appears 78 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 004181F2 appears 42 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 00445AE0 appears 110 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 0041341F appears 36 times
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: String function: 00422240 appears 38 times
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: String function: 00445AE0 appears 55 times
            Source: PO-A1702108.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 9.2.nonsubmerged.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 4.2.nonsubmerged.exe.16a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 6.2.nonsubmerged.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 11.2.nonsubmerged.exe.3c00000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 2.2.nonsubmerged.exe.3b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000004.00000002.2127421711.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000009.00000002.2241407870.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0000000B.00000002.2254284355.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 00000007.00000002.2254378671.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 00000002.00000002.2117946053.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000006.00000002.2145593123.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@22/3@2/2
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,2_2_00464EAE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,4_2_00464EAE
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\PO-A1702108.exeFile created: C:\Users\user\AppData\Local\HymenophyllaceaeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\PO-A1702108.exeFile created: C:\Users\user\AppData\Local\Temp\bleacherJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs"
            Source: PO-A1702108.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO-A1702108.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PO-A1702108.exeReversingLabs: Detection: 57%
            Source: C:\Users\user\Desktop\PO-A1702108.exeFile read: C:\Users\user\Desktop\PO-A1702108.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\PO-A1702108.exe "C:\Users\user\Desktop\PO-A1702108.exe"
            Source: C:\Users\user\Desktop\PO-A1702108.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\Desktop\PO-A1702108.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO-A1702108.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
            Source: C:\Users\user\Desktop\PO-A1702108.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\Desktop\PO-A1702108.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO-A1702108.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: PO-A1702108.exeStatic file information: File size 1343013 > 1048576
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2255486571.0000000001091000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: nonsubmerged.exe, 00000002.00000003.2116189971.0000000004680000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000002.00000003.2116346139.0000000004820000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2124974326.0000000004800000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2125226631.0000000004660000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2136167856.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2141266997.0000000004630000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238714875.00000000048E0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238557587.0000000004740000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2249869546.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2248501737.0000000004860000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: nonsubmerged.exe, 00000002.00000003.2116189971.0000000004680000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000002.00000003.2116346139.0000000004820000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2124974326.0000000004800000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000004.00000003.2125226631.0000000004660000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2136167856.00000000047D0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000006.00000003.2141266997.0000000004630000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238714875.00000000048E0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 00000009.00000003.2238557587.0000000004740000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2249869546.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, nonsubmerged.exe, 0000000B.00000003.2248501737.0000000004860000.00000004.00001000.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: PO-A1702108.exeStatic PE information: real checksum: 0xa961f should be: 0x156018
            Source: nonsubmerged.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x156018
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00416CB5 push ecx; ret 2_2_00416CC8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00416CB5 push ecx; ret 4_2_00416CC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00423149 push eax; ret 7_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C50E push cs; iretd 7_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004231C8 push eax; ret 7_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E21D push ecx; ret 7_2_0040E230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C6BE push ebx; ret 7_2_0041C6BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C14F91 push ds; ret 7_2_02C14F97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C1479C push ss; retf 7_2_02C1479F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C1579F push edi; ret 7_2_02C157A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C14F5F push ebx; ret 7_2_02C14F62
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02C13CF7 push ecx; iretd 7_2_02C13D0B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_03254F5F push ebx; ret 12_2_03254F62
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_03254F91 push ds; ret 12_2_03254F97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325479C push ss; retf 12_2_0325479F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0325579F push edi; ret 12_2_032557A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_03253CF7 push ecx; iretd 12_2_03253D0B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB81A4 push ss; ret 12_2_06EB81A6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_06EB8185 push ss; ret 12_2_06EB8187
            Source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7h2Ux6lkPc7d', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7h2Ux6lkPc7d', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7h2Ux6lkPc7d', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7h2Ux6lkPc7d', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7h2Ux6lkPc7d', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: C:\Users\user\Desktop\PO-A1702108.exeFile created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbsJump to dropped file
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbsJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbsJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_0047A330
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00434418
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,4_2_0047A330
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,4_2_00434418
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI/Special instruction interceptor: Address: 41572DC
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI/Special instruction interceptor: Address: 4150344
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI/Special instruction interceptor: Address: 41162AC
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI/Special instruction interceptor: Address: 42322BC
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI/Special instruction interceptor: Address: 41A82BC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2571Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7802Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1663Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\PO-A1702108.exeAPI coverage: 3.3 %
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI coverage: 3.6 %
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI coverage: 3.4 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99780Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99521Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98451Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97906Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97794Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97688Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97578Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97469Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97131Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96852Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96739Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96483Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96375Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96141Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95906Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95797Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95686Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95578Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95469Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95358Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95250Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95141Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99312Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99202Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98983Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98875Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98765Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98327Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98206Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98080Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97843Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97515Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95391Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95281Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95172Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95062Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: nonsubmerged.exe, 00000002.00000002.2117535997.000000000091E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: nonsubmerged.exe, 00000002.00000003.2116801101.0000000000940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:D
            Source: RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0427E518 mov eax, dword ptr fs:[00000030h]0_2_0427E518
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0427E578 mov eax, dword ptr fs:[00000030h]0_2_0427E578
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0427CEF8 mov eax, dword ptr fs:[00000030h]0_2_0427CEF8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_04157548 mov eax, dword ptr fs:[00000030h]2_2_04157548
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_041575A8 mov eax, dword ptr fs:[00000030h]2_2_041575A8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_04155F28 mov eax, dword ptr fs:[00000030h]2_2_04155F28
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_041505B0 mov eax, dword ptr fs:[00000030h]4_2_041505B0
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_04150610 mov eax, dword ptr fs:[00000030h]4_2_04150610
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0414EF90 mov eax, dword ptr fs:[00000030h]4_2_0414EF90
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 6_2_04116518 mov eax, dword ptr fs:[00000030h]6_2_04116518
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 6_2_04116578 mov eax, dword ptr fs:[00000030h]6_2_04116578
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 6_2_04114EF8 mov eax, dword ptr fs:[00000030h]6_2_04114EF8
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 9_2_04232528 mov eax, dword ptr fs:[00000030h]9_2_04232528
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 9_2_04230F08 mov eax, dword ptr fs:[00000030h]9_2_04230F08
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 9_2_04232588 mov eax, dword ptr fs:[00000030h]9_2_04232588
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 11_2_041A8588 mov eax, dword ptr fs:[00000030h]11_2_041A8588
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 11_2_041A6F08 mov eax, dword ptr fs:[00000030h]11_2_041A6F08
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 11_2_041A8528 mov eax, dword ptr fs:[00000030h]11_2_041A8528
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0041F250 SetUnhandledExceptionFilter,2_2_0041F250
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041A208
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00417DAA
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0041F250 SetUnhandledExceptionFilter,4_2_0041F250
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0041A208
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00417DAA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base address: 410000Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: EAC008Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1158008Jump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PO-A1702108.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: nonsubmerged.exeBinary or memory string: Shell_TrayWnd
            Source: PO-A1702108.exe, nonsubmerged.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,7_2_00417A20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Users\user\Desktop\PO-A1702108.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.0000000003734000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.000000000375F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.000000000316F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1164, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5972, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: nonsubmerged.exeBinary or memory string: WIN_XP
            Source: nonsubmerged.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: nonsubmerged.exeBinary or memory string: WIN_XPe
            Source: nonsubmerged.exeBinary or memory string: WIN_VISTA
            Source: nonsubmerged.exeBinary or memory string: WIN_7
            Source: nonsubmerged.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.0000000003734000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1164, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5972, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.0000000003734000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3354209403.000000000375F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2260012334.000000000316F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1164, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5972, type: MEMORYSTR
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.4143590.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060ee8.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e800d6.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.3060000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.5730000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f6458.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.40f5570.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.RegSvcs.exe.2e7f1ee.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\PO-A1702108.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_004652BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00476619
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 2_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,2_2_0046CEF3
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,4_2_004652BE
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,4_2_00476619
            Source: C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exeCode function: 4_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,4_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            2
            Valid Accounts
            121
            Windows Management Instrumentation
            111
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            121
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Shared Modules
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            1
            Credentials in Registry
            2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron2
            Registry Run Keys / Startup Folder
            21
            Access Token Manipulation
            1
            Software Packing
            NTDS138
            System Information Discovery
            Distributed Component Object Model121
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets341
            Security Software Discovery
            SSH3
            Clipboard Data
            23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
            Registry Run Keys / Startup Folder
            1
            Masquerading
            Cached Domain Credentials121
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
            Virtualization/Sandbox Evasion
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
            Process Injection
            Network Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1513875 Sample: PO-A1702108.exe Startdate: 19/09/2024 Architecture: WINDOWS Score: 100 46 mail.privateemail.com 2->46 48 api.ipify.org 2->48 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus / Scanner detection for submitted sample 2->68 70 9 other signatures 2->70 10 PO-A1702108.exe 3 2->10         started        13 wscript.exe 1 2->13         started        signatures3 process4 file5 44 C:\Users\user\AppData\...\nonsubmerged.exe, PE32 10->44 dropped 16 nonsubmerged.exe 1 10->16         started        82 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->82 20 nonsubmerged.exe 13->20         started        signatures6 process7 file8 42 C:\Users\user\AppData\...\nonsubmerged.vbs, data 16->42 dropped 54 Antivirus detection for dropped file 16->54 56 Multi AV Scanner detection for dropped file 16->56 58 Machine Learning detection for dropped file 16->58 62 2 other signatures 16->62 22 nonsubmerged.exe 16->22         started        24 RegSvcs.exe 16->24         started        60 Sample uses process hollowing technique 20->60 27 nonsubmerged.exe 20->27         started        29 RegSvcs.exe 20->29         started        signatures9 process10 signatures11 31 nonsubmerged.exe 22->31         started        34 RegSvcs.exe 22->34         started        76 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 24->76 78 Writes to foreign memory regions 27->78 80 Maps a DLL or memory area into another process 27->80 36 RegSvcs.exe 2 27->36         started        process12 signatures13 84 Writes to foreign memory regions 31->84 86 Maps a DLL or memory area into another process 31->86 38 RegSvcs.exe 15 2 31->38         started        88 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 36->88 90 Tries to steal Mail credentials (via file / registry access) 36->90 92 Tries to harvest and steal ftp login credentials 36->92 94 Tries to harvest and steal browser information (history, passwords, etc) 36->94 process14 dnsIp15 50 mail.privateemail.com 198.54.122.135, 49705, 49709, 587 NAMECHEAP-NETUS United States 38->50 52 api.ipify.org 104.26.12.205, 443, 49704, 49706 CLOUDFLARENETUS United States 38->52 72 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->72 74 Tries to steal Mail credentials (via file / registry access) 38->74 signatures16

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO-A1702108.exe58%ReversingLabsWin32.Trojan.Autoitinject
            PO-A1702108.exe100%AviraHEUR/AGEN.1321685
            PO-A1702108.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe100%AviraHEUR/AGEN.1321685
            C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe58%ReversingLabsWin32.Trojan.Autoitinject
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://sectigo.com/CPS00%URL Reputationsafe
            https://account.dyn.com/0%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%Avira URL Cloudsafe
            https://api.ipify.org0%Avira URL Cloudsafe
            https://api.ipify.org/0%Avira URL Cloudsafe
            http://mail.privateemail.com0%Avira URL Cloudsafe
            https://api.ipify.org/t0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            mail.privateemail.com
            198.54.122.135
            truetrue
              unknown
              api.ipify.org
              104.26.12.205
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.ipify.orgRegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://sectigo.com/CPS0RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://account.dyn.com/RegSvcs.exe, 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ocsp.sectigo.com0RegSvcs.exe, 00000007.00000002.2255486571.0000000001101000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2263594564.0000000006292000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3352072890.0000000001582000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.0000000006062000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3357640471.00000000060EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://api.ipify.org/tRegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://mail.privateemail.comRegSvcs.exe, 00000007.00000002.2260012334.000000000316F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.000000000375F000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.2260012334.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3354209403.00000000036F0000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.26.12.205
                api.ipify.orgUnited States
                13335CLOUDFLARENETUSfalse
                198.54.122.135
                mail.privateemail.comUnited States
                22612NAMECHEAP-NETUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1513875
                Start date and time:2024-09-19 15:27:38 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 9m 16s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:PO-A1702108.exe
                Detection:MAL
                Classification:mal100.troj.spyw.expl.evad.winEXE@22/3@2/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 52
                • Number of non-executed functions: 312
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: PO-A1702108.exe
                TimeTypeDescription
                09:28:39API Interceptor90x Sleep call for process: RegSvcs.exe modified
                15:28:37AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                104.26.12.205file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                • api.ipify.org/
                fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                • api.ipify.org/
                zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                • api.ipify.org/
                vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                • api.ipify.org/
                vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                • api.ipify.org/
                SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exeGet hashmaliciousStealcBrowse
                • api.ipify.org/
                Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
                • api.ipify.org/
                SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                198.54.122.135DO9uvdGMde.exeGet hashmaliciousAgentTeslaBrowse
                  4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                    SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                      IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                        RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                          Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                            PO N#U00b0202415-0004 CULTER-ASSOCIETES_pdf.exeGet hashmaliciousAgentTeslaBrowse
                              RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTeslaBrowse
                                img_Zam#U00f3wienie - #20240716-A09461_pdf.com.exeGet hashmaliciousAgentTeslaBrowse
                                  Zam#U00f3wienie - #20240715-A09461_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    mail.privateemail.comDO9uvdGMde.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                    • 198.54.122.135
                                    SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    • 198.54.122.135
                                    RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    • 198.54.122.135
                                    Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    PO N#U00b0202415-0004 CULTER-ASSOCIETES_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    img_Zam#U00f3wienie - #20240716-A09461_pdf.com.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    Zam#U00f3wienie - #20240715-A09461_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.54.122.135
                                    api.ipify.orgoriginal (37).emlGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    ArenaWarsSetup.exeGet hashmaliciousUnknownBrowse
                                    • 172.67.74.152
                                    ArenaWarsSetup.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    https://request-checksid-711843.pages.dev/robots.txt/Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    https://exjr5g5nif.fessional.shop/?email=anRvcmtlbHNvbkBjY2ZpLmNvbQ==Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                    • 104.26.12.205
                                    18092024 PDF.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.12.205
                                    2723912 PDF.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    MV ALIADO - S-REQ-19-00064.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 104.26.13.205
                                    https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wD6jzGRyycT&sa=t&esrc=6jzGRFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ1GcDqhlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fanoboy.pw%2Fojo%2Flok%2F9198595720/#a2FybC5ib25uZXJAYXR1Lmll=$%E3%80%82Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                    • 104.26.13.205
                                    EIirQiZnX9.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 104.26.13.205
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSPO-27893493.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 188.114.97.3
                                    https://pub-b21271990c74459f8088c501f667a689.r2.dev/ladiesfirst.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 104.17.25.14
                                    Recibo de pago.880743.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 188.114.97.3
                                    https://computing-customer-6850.my.salesforce-sites.com/supportGet hashmaliciousUnknownBrowse
                                    • 172.66.0.227
                                    Wspguvcwm.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.114.96.3
                                    ARIZONA GROUP PO_017633180924.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 188.114.96.3
                                    AWB_Ref#339720937705pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.114.97.3
                                    DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                    • 172.67.181.150
                                    DHL documents_PDF.exeGet hashmaliciousFormBookBrowse
                                    • 188.114.97.3
                                    Estado de Cuenta.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.114.97.3
                                    NAMECHEAP-NETUS2nd RFQ TECMARKQATAR PO33218_PDF.exeGet hashmaliciousFormBookBrowse
                                    • 162.0.238.43
                                    DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                    • 199.192.21.169
                                    original (37).emlGet hashmaliciousUnknownBrowse
                                    • 199.188.200.183
                                    https://neebedankt-f8cdcf.ingress-earth.ewp.live/wp-content/plugins/esidemthuis/pages/region.php?lcaGet hashmaliciousUnknownBrowse
                                    • 63.250.43.128
                                    https://frizzonaireproclarks-goawhip-f7a93a.ingress-bonde.ewp.live/wp-content/plugins/O-beaspieching/pages/region.php?lcaGet hashmaliciousUnknownBrowse
                                    • 63.250.43.2
                                    https://exjr5g5nif.fessional.shop/?email=anRvcmtlbHNvbkBjY2ZpLmNvbQ==Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                    • 162.0.228.73
                                    PAGO $830.900.exeGet hashmaliciousFormBookBrowse
                                    • 63.250.47.40
                                    https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wD6jzGRyycT&sa=t&esrc=6jzGRFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ1GcDqhlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fanoboy.pw%2Fojo%2Flok%2F9198595720/#a2FybC5ib25uZXJAYXR1Lmll=$%E3%80%82Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                    • 162.0.228.73
                                    https://urlz.fr/sarOGet hashmaliciousUnknownBrowse
                                    • 63.250.43.136
                                    https://thomasuhe-f90d31.ingress-florina.ewp.live/wp-content/plugins/agrinotcc/pages/region.php?lca#3f735a1f7f42382abGet hashmaliciousUnknownBrowse
                                    • 63.250.43.137
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0ePO-27893493.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.12.205
                                    Recibo de pago.880743.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.12.205
                                    PO.exeGet hashmaliciousFormBookBrowse
                                    • 104.26.12.205
                                    hi.jsGet hashmaliciousHTMLPhisherBrowse
                                    • 104.26.12.205
                                    Wspguvcwm.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.26.12.205
                                    ARIZONA GROUP PO_017633180924.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.12.205
                                    FDS00000900000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.12.205
                                    FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.12.205
                                    Invoice & C form TT 175102.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.26.12.205
                                    OC_0069960.pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 104.26.12.205
                                    No context
                                    Process:C:\Users\user\Desktop\PO-A1702108.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):1343013
                                    Entropy (8bit):7.530230385382373
                                    Encrypted:false
                                    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCkt8T6K1lWIWnb2aY48LVbOolTXYO:7JZoQrbTFZY1iaCkeblWIWb2aY48xT1
                                    MD5:8A0BB862ED0ACEF45107D21E4735E8E1
                                    SHA1:AF9661B6EB2CA83BE84D013FFCAAF750A38D6AFE
                                    SHA-256:987B95EBFF5F1B9E47105EA5C3D5FAFC841B1FBA94AE40630D956DE2654EBDC6
                                    SHA-512:79A6EB5F61697A36C09D38F4C5AC2DA1D4458DCFD13617D28A2D222F3726D38278914421BFB59C2E140CA012AB32727C1D5FC6F3C77BA5341A1B10528DE1E3BE
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 58%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\PO-A1702108.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):268288
                                    Entropy (8bit):7.8821199793827015
                                    Encrypted:false
                                    SSDEEP:6144:or9ZCg7ajH7W5tpikqKGf2PZjv4llbrKpvwim4uhp:ouSavWLpiAv4lJKpwimjp
                                    MD5:5E888EC17AB785FD20601AA0D3299D31
                                    SHA1:D02D473DAF57E921177FDD8D67D0BAC9094DECF3
                                    SHA-256:076FBF24AE4CB6407776BF570DB94A92ED74CC22EA61225A860C67EB5E2B8208
                                    SHA-512:FB7713BAE4BF4D6955CAF34D0C7C9ADF2C4983DD7823A07D0855FACDC4F3E0F73DA301FF938F2CB2677A02FF03489002723A28201CB30857804491F0443CA3F1
                                    Malicious:false
                                    Reputation:low
                                    Preview:...Z1Q3RNCPC..8Z.Q3RJCPC.U8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPC.U8Z<N.\J.Y.`.9..pg:#0p33:_(S<.1+->,5uZ?.#F<j*>c..kz_>W7dN]IeU8Z2Q3R"S.nm$.$. .,f2.=svG$. .,A..=j$.$. .,.2.=svV$. .,x`9=.$.$.rH,g2.=.<[2. .,JCPCAU8Z2Q3RJCPC..Q<2Q3R..PC.T<ZF.3.JCPCAU8Z.Q.SABYCA.9Z2-1RJCPCn.8Z2A3RJ.QCAUxZ2A3RJAPCDU8Z2Q3ROCPCAU8Z217RJGPC.n:Z0Q3.JC@CAE8Z2Q#RJSPCAU8Z"Q3RJCPCAU8Z.D1R.CPCA5:Zz.2RJCPCAU8Z2Q3RJCPCAU8Z2Q3R..QC]U8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z.\1R.CPCAU8Z2Q3RJ.QC.T8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z.%V*>CPCY.9Z2A3RJ.QCAQ8Z2Q3RJCPCAU8Z.Q32d14"548Z.<3RJ.QCA;8Z2.2RJCPCAU8Z2Q3R.CP.o1Y.SQ3R.sPCAu:Z2G3RJIRCAU8Z2Q3RJCPC.U8..#@ )CPC..9Z211RJ.QCAu:Z2Q3RJCPCAU8ZrQ3.JCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z2Q3RJCPCAU8Z
                                    Process:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):300
                                    Entropy (8bit):3.4418071898215366
                                    Encrypted:false
                                    SSDEEP:6:DMM8lfm3OOQdUfclo5ZsUEZ+lX1Bar6lElAlIKKFA6nriIM8lfQVn:DsO+vNlzQ1Bm6xl/4mA2n
                                    MD5:B2679268A3FE12E22076334BCE1E98ED
                                    SHA1:724C325A6DAF1B939AA3C8EFE6546D70B16BF6F1
                                    SHA-256:A5461C6EFA1C68B1A99B6C5DBEC312083651B0B3824883FFE0921E58322365F5
                                    SHA-512:455F58BD8BB1318DA424B72D486E33382D99411B2D6633AD95B57EF2FB354C39968E5E3F2E9F6A653961DABD7A08FD473E74431F11E2F7724E6F90589830A92F
                                    Malicious:true
                                    Reputation:low
                                    Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.H.y.m.e.n.o.p.h.y.l.l.a.c.e.a.e.\.n.o.n.s.u.b.m.e.r.g.e.d...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.530230385382373
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:PO-A1702108.exe
                                    File size:1'343'013 bytes
                                    MD5:8a0bb862ed0acef45107d21e4735e8e1
                                    SHA1:af9661b6eb2ca83be84d013ffcaaf750a38d6afe
                                    SHA256:987b95ebff5f1b9e47105ea5c3d5fafc841b1fba94ae40630d956de2654ebdc6
                                    SHA512:79a6eb5f61697a36c09d38f4c5ac2da1d4458dcfd13617d28a2d222f3726d38278914421bfb59c2e140ca012ab32727c1d5fc6f3c77ba5341a1b10528de1e3be
                                    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCkt8T6K1lWIWnb2aY48LVbOolTXYO:7JZoQrbTFZY1iaCkeblWIWb2aY48xT1
                                    TLSH:8B55F121F9C69036C2F323B19E7FF76A963D69360336D2D727C81D215EA05416B2A723
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                    Icon Hash:1733312925935517
                                    Entrypoint:0x4165c1
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                    Instruction
                                    call 00007FC970BEDABBh
                                    jmp 00007FC970BE492Eh
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    push ebp
                                    mov ebp, esp
                                    push edi
                                    push esi
                                    mov esi, dword ptr [ebp+0Ch]
                                    mov ecx, dword ptr [ebp+10h]
                                    mov edi, dword ptr [ebp+08h]
                                    mov eax, ecx
                                    mov edx, ecx
                                    add eax, esi
                                    cmp edi, esi
                                    jbe 00007FC970BE4AAAh
                                    cmp edi, eax
                                    jc 00007FC970BE4C46h
                                    cmp ecx, 00000080h
                                    jc 00007FC970BE4ABEh
                                    cmp dword ptr [004A9724h], 00000000h
                                    je 00007FC970BE4AB5h
                                    push edi
                                    push esi
                                    and edi, 0Fh
                                    and esi, 0Fh
                                    cmp edi, esi
                                    pop esi
                                    pop edi
                                    jne 00007FC970BE4AA7h
                                    jmp 00007FC970BE4E82h
                                    test edi, 00000003h
                                    jne 00007FC970BE4AB6h
                                    shr ecx, 02h
                                    and edx, 03h
                                    cmp ecx, 08h
                                    jc 00007FC970BE4ACBh
                                    rep movsd
                                    jmp dword ptr [00416740h+edx*4]
                                    mov eax, edi
                                    mov edx, 00000003h
                                    sub ecx, 04h
                                    jc 00007FC970BE4AAEh
                                    and eax, 03h
                                    add ecx, eax
                                    jmp dword ptr [00416654h+eax*4]
                                    jmp dword ptr [00416750h+ecx*4]
                                    nop
                                    jmp dword ptr [004166D4h+ecx*4]
                                    nop
                                    inc cx
                                    add byte ptr [eax-4BFFBE9Ah], dl
                                    inc cx
                                    add byte ptr [ebx], ah
                                    ror dword ptr [edx-75F877FAh], 1
                                    inc esi
                                    add dword ptr [eax+468A0147h], ecx
                                    add al, cl
                                    jmp 00007FC97305D2A7h
                                    add esi, 03h
                                    add edi, 03h
                                    cmp ecx, 08h
                                    jc 00007FC970BE4A6Eh
                                    rep movsd
                                    jmp dword ptr [00000000h+edx*4]
                                    Programming Language:
                                    • [ C ] VS2010 SP1 build 40219
                                    • [C++] VS2010 SP1 build 40219
                                    • [ C ] VS2008 SP1 build 30729
                                    • [IMP] VS2008 SP1 build 30729
                                    • [ASM] VS2010 SP1 build 40219
                                    • [RES] VS2010 SP1 build 40219
                                    • [LNK] VS2010 SP1 build 40219
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                    RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                    RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                    RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                    RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                    RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                    RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                    RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                    RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                    RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                    RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                    RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                    RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                    RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                    RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                    RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                    RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                    RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                    RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                    RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                    RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                    RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                    RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                    RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                    RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                    RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                    RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                    DLLImport
                                    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishGreat Britain
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 19, 2024 15:28:39.822419882 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:39.822485924 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:39.822592974 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:39.830514908 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:39.830554962 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.306078911 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.306178093 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:40.311666012 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:40.311712980 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.312098980 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.354367971 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:40.369168997 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:40.411400080 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.483151913 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.483309031 CEST44349704104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:40.483374119 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:40.489943981 CEST49704443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:41.288525105 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:41.293514013 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:41.293591022 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:42.385720015 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:42.386044025 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:42.390949965 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:42.672513962 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:42.672802925 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:42.677709103 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:42.958807945 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:42.959760904 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:42.964731932 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249069929 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249114990 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249150991 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249185085 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249206066 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.249218941 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249253988 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.249258995 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.249300957 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.284266949 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.289290905 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.571208954 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.575264931 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.580414057 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.861599922 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:43.862724066 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:43.867614985 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.151598930 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.159745932 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:44.164776087 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.448299885 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.453571081 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:44.458355904 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.743972063 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:44.744586945 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:44.749435902 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.063500881 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.070633888 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:45.075553894 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.357491016 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.358232021 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:45.358232021 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:45.358278990 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:45.358278990 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:45.363082886 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.363095999 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.363253117 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:45.363303900 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:46.007165909 CEST58749705198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:46.057544947 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:50.630928040 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:50.631035089 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:50.631127119 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:50.658209085 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:50.658256054 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.143275976 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.143354893 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.145308018 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.145324945 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.145674944 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.198127985 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.205308914 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.247415066 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.323971987 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.324053049 CEST44349706104.26.12.205192.168.2.5
                                    Sep 19, 2024 15:28:51.324225903 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.327056885 CEST49706443192.168.2.5104.26.12.205
                                    Sep 19, 2024 15:28:51.425026894 CEST49705587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:51.924288988 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:51.930680990 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:51.930768967 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:53.437124014 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:53.437398911 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:53.442184925 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:53.719839096 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:53.720096111 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:53.724900961 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.127224922 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.128297091 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.135240078 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413835049 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413866043 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413888931 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413902044 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413913965 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413927078 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.413938046 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.413970947 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.413988113 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.416577101 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.421500921 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.698853016 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.706577063 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.711540937 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.990061045 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:54.990398884 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:54.996344090 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.273649931 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.274075985 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:55.278983116 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.557976961 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.558628082 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:55.563549995 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.844341993 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:55.844582081 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:55.849438906 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.161741972 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.161969900 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:56.166774035 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.506414890 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.507123947 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:56.507194042 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:56.507263899 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:56.507285118 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:28:56.512109995 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.512126923 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.512212038 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:56.512233019 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:57.145463943 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:28:57.198152065 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:30:31.948486090 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:30:31.953386068 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:30:32.231024981 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:30:32.231239080 CEST58749709198.54.122.135192.168.2.5
                                    Sep 19, 2024 15:30:32.231372118 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:30:32.231715918 CEST49709587192.168.2.5198.54.122.135
                                    Sep 19, 2024 15:30:32.236515999 CEST58749709198.54.122.135192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 19, 2024 15:28:39.808492899 CEST5458853192.168.2.51.1.1.1
                                    Sep 19, 2024 15:28:39.815640926 CEST53545881.1.1.1192.168.2.5
                                    Sep 19, 2024 15:28:41.080641031 CEST5711353192.168.2.51.1.1.1
                                    Sep 19, 2024 15:28:41.287720919 CEST53571131.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 19, 2024 15:28:39.808492899 CEST192.168.2.51.1.1.10x4f17Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                    Sep 19, 2024 15:28:41.080641031 CEST192.168.2.51.1.1.10xe34cStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 19, 2024 15:28:39.815640926 CEST1.1.1.1192.168.2.50x4f17No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                    Sep 19, 2024 15:28:39.815640926 CEST1.1.1.1192.168.2.50x4f17No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                    Sep 19, 2024 15:28:39.815640926 CEST1.1.1.1192.168.2.50x4f17No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                    Sep 19, 2024 15:28:41.287720919 CEST1.1.1.1192.168.2.50xe34cNo error (0)mail.privateemail.com198.54.122.135A (IP address)IN (0x0001)false
                                    • api.ipify.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549704104.26.12.2054431164C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-19 13:28:40 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2024-09-19 13:28:40 UTC211INHTTP/1.1 200 OK
                                    Date: Thu, 19 Sep 2024 13:28:40 GMT
                                    Content-Type: text/plain
                                    Content-Length: 11
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 8c59eb949b3843c2-EWR
                                    2024-09-19 13:28:40 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                    Data Ascii: 8.46.123.33


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549706104.26.12.2054435972C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-19 13:28:51 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2024-09-19 13:28:51 UTC211INHTTP/1.1 200 OK
                                    Date: Thu, 19 Sep 2024 13:28:51 GMT
                                    Content-Type: text/plain
                                    Content-Length: 11
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 8c59ebd85a0c41ba-EWR
                                    2024-09-19 13:28:51 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                    Data Ascii: 8.46.123.33


                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Sep 19, 2024 15:28:42.385720015 CEST58749705198.54.122.135192.168.2.5220 PrivateEmail.com prod Mail Node
                                    Sep 19, 2024 15:28:42.386044025 CEST49705587192.168.2.5198.54.122.135EHLO 226546
                                    Sep 19, 2024 15:28:42.672513962 CEST58749705198.54.122.135192.168.2.5250-mta-09.privateemail.com
                                    250-PIPELINING
                                    250-SIZE 81788928
                                    250-ETRN
                                    250-AUTH PLAIN LOGIN
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-CHUNKING
                                    250 STARTTLS
                                    Sep 19, 2024 15:28:42.672802925 CEST49705587192.168.2.5198.54.122.135STARTTLS
                                    Sep 19, 2024 15:28:42.958807945 CEST58749705198.54.122.135192.168.2.5220 Ready to start TLS
                                    Sep 19, 2024 15:28:53.437124014 CEST58749709198.54.122.135192.168.2.5220 PrivateEmail.com prod Mail Node
                                    Sep 19, 2024 15:28:53.437398911 CEST49709587192.168.2.5198.54.122.135EHLO 226546
                                    Sep 19, 2024 15:28:53.719839096 CEST58749709198.54.122.135192.168.2.5250-mta-09.privateemail.com
                                    250-PIPELINING
                                    250-SIZE 81788928
                                    250-ETRN
                                    250-AUTH PLAIN LOGIN
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-CHUNKING
                                    250 STARTTLS
                                    Sep 19, 2024 15:28:53.720096111 CEST49709587192.168.2.5198.54.122.135STARTTLS
                                    Sep 19, 2024 15:28:54.127224922 CEST58749709198.54.122.135192.168.2.5220 Ready to start TLS

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:28:32
                                    Start date:19/09/2024
                                    Path:C:\Users\user\Desktop\PO-A1702108.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\PO-A1702108.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:09:28:33
                                    Start date:19/09/2024
                                    Path:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\PO-A1702108.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.2117946053.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 58%, ReversingLabs
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:09:28:34
                                    Start date:19/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\PO-A1702108.exe"
                                    Imagebase:0xb0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:09:28:35
                                    Start date:19/09/2024
                                    Path:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.2127421711.00000000016A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:5
                                    Start time:09:28:36
                                    Start date:19/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x250000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:09:28:36
                                    Start date:19/09/2024
                                    Path:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000006.00000002.2145593123.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:7
                                    Start time:09:28:37
                                    Start date:19/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0xc20000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2259620456.0000000002E3F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000007.00000002.2262563276.0000000005730000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000002.2254378671.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000007.00000002.2259853978.0000000003060000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2261589551.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2260012334.0000000003177000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2260012334.0000000003144000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2260012334.0000000003144000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2260012334.000000000316F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:09:28:46
                                    Start date:19/09/2024
                                    Path:C:\Windows\System32\wscript.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs"
                                    Imagebase:0x7ff670b30000
                                    File size:170'496 bytes
                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:09:28:46
                                    Start date:19/09/2024
                                    Path:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000009.00000002.2241407870.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:10
                                    Start time:09:28:47
                                    Start date:19/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x410000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:09:28:47
                                    Start date:19/09/2024
                                    Path:C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0x400000
                                    File size:1'343'013 bytes
                                    MD5 hash:8A0BB862ED0ACEF45107D21E4735E8E1
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000B.00000002.2254284355.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:12
                                    Start time:09:28:48
                                    Start date:19/09/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Hymenophyllaceae\nonsubmerged.exe"
                                    Imagebase:0xfd0000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.3354209403.0000000003734000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3354209403.0000000003734000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3354209403.0000000003767000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3354209403.000000000375F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:3.1%
                                      Dynamic/Decrypted Code Coverage:0.4%
                                      Signature Coverage:8.7%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:37
                                      execution_graph 84778 4010e0 84781 401100 84778->84781 84780 4010f8 84782 401113 84781->84782 84783 401120 84782->84783 84784 401184 84782->84784 84785 40114c 84782->84785 84815 401182 84782->84815 84786 40112c DefWindowProcW 84783->84786 84826 401000 Shell_NotifyIconW __wctomb_s_l 84783->84826 84819 401250 61 API calls __wctomb_s_l 84784->84819 84787 401151 84785->84787 84788 40119d 84785->84788 84786->84780 84790 401219 84787->84790 84791 40115d 84787->84791 84793 4011a3 84788->84793 84794 42afb4 84788->84794 84790->84783 84797 401225 84790->84797 84795 401163 84791->84795 84796 42b01d 84791->84796 84792 401193 84792->84780 84793->84783 84800 4011b6 KillTimer 84793->84800 84801 4011db SetTimer RegisterWindowMessageW 84793->84801 84821 40f190 10 API calls 84794->84821 84802 42afe9 84795->84802 84803 40116c 84795->84803 84796->84786 84825 4370f4 52 API calls 84796->84825 84828 468b0e 74 API calls __wctomb_s_l 84797->84828 84820 401000 Shell_NotifyIconW __wctomb_s_l 84800->84820 84801->84792 84807 401204 CreatePopupMenu 84801->84807 84823 40f190 10 API calls 84802->84823 84803->84783 84809 401174 84803->84809 84804 42b04f 84827 40e0c0 74 API calls __wctomb_s_l 84804->84827 84807->84780 84822 45fd57 65 API calls __wctomb_s_l 84809->84822 84812 42afe4 84812->84792 84813 42b00e 84824 401a50 338 API calls 84813->84824 84814 4011c9 PostQuitMessage 84814->84780 84815->84786 84818 42afdc 84818->84786 84818->84812 84819->84792 84820->84814 84821->84792 84822->84818 84823->84813 84824->84815 84825->84815 84826->84804 84827->84815 84828->84812 84829 40bd20 84830 428194 84829->84830 84831 40bd2d 84829->84831 84833 40bd43 84830->84833 84834 4281bc 84830->84834 84836 4281b2 84830->84836 84832 40bd37 84831->84832 84852 4531b1 85 API calls 5 library calls 84831->84852 84841 40bd50 84832->84841 84851 45e987 86 API calls moneypunct 84834->84851 84850 40b510 VariantClear 84836->84850 84840 4281ba 84842 426cf1 84841->84842 84843 40bd63 84841->84843 84862 44cde9 52 API calls _memmove 84842->84862 84853 40bd80 84843->84853 84846 40bd73 84846->84833 84847 426cfc 84863 40e0a0 84847->84863 84849 426d02 84850->84840 84851->84831 84852->84832 84854 40bd8e 84853->84854 84861 40bdb7 _memmove 84853->84861 84855 40bded 84854->84855 84856 40bdad 84854->84856 84854->84861 84873 4115d7 84855->84873 84867 402f00 84856->84867 84860 4115d7 52 API calls 84860->84861 84861->84846 84862->84847 84864 40e0b2 84863->84864 84865 40e0a8 84863->84865 84864->84849 84907 403c30 52 API calls _memmove 84865->84907 84868 402f0c 84867->84868 84869 402f10 84867->84869 84868->84861 84870 4115d7 52 API calls 84869->84870 84871 4268c3 84869->84871 84872 402f51 moneypunct _memmove 84870->84872 84872->84861 84875 4115e1 _malloc 84873->84875 84876 40bdf6 84875->84876 84879 4115fd std::exception::exception 84875->84879 84884 4135bb 84875->84884 84876->84860 84876->84861 84877 41163b 84899 4180af 46 API calls std::exception::operator= 84877->84899 84879->84877 84898 41130a 51 API calls __cinit 84879->84898 84880 411645 84900 418105 RaiseException 84880->84900 84883 411656 84885 413638 _malloc 84884->84885 84891 4135c9 _malloc 84884->84891 84906 417f77 46 API calls __getptd_noexit 84885->84906 84888 4135f7 RtlAllocateHeap 84888->84891 84897 413630 84888->84897 84890 413624 84904 417f77 46 API calls __getptd_noexit 84890->84904 84891->84888 84891->84890 84892 4135d4 84891->84892 84895 413622 84891->84895 84892->84891 84901 418901 46 API calls __NMSG_WRITE 84892->84901 84902 418752 46 API calls 7 library calls 84892->84902 84903 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84892->84903 84905 417f77 46 API calls __getptd_noexit 84895->84905 84897->84875 84898->84877 84899->84880 84900->84883 84901->84892 84902->84892 84904->84895 84905->84897 84906->84897 84907->84864 84908 425ba2 84913 40e360 84908->84913 84910 425bb4 84929 41130a 51 API calls __cinit 84910->84929 84912 425bbe 84914 4115d7 52 API calls 84913->84914 84915 40e3ec GetModuleFileNameW 84914->84915 84930 413a0e 84915->84930 84917 40e421 _wcsncat 84933 413a9e 84917->84933 84920 4115d7 52 API calls 84921 40e45e _wcscpy 84920->84921 84936 40bc70 84921->84936 84925 40e4a9 84925->84910 84926 401c90 52 API calls 84928 40e4a1 _wcscat _wcslen _wcsncpy 84926->84928 84927 4115d7 52 API calls 84927->84928 84928->84925 84928->84926 84928->84927 84929->84912 84955 413801 84930->84955 84985 419efd 84933->84985 84937 4115d7 52 API calls 84936->84937 84938 40bc98 84937->84938 84939 4115d7 52 API calls 84938->84939 84940 40bca6 84939->84940 84941 40e4c0 84940->84941 84997 403350 84941->84997 84943 40e4cb RegOpenKeyExW 84944 427190 RegQueryValueExW 84943->84944 84945 40e4eb 84943->84945 84946 4271b0 84944->84946 84947 42721a RegCloseKey 84944->84947 84945->84928 84948 4115d7 52 API calls 84946->84948 84947->84928 84949 4271cb 84948->84949 85004 43652f 52 API calls 84949->85004 84951 4271d8 RegQueryValueExW 84952 4271f7 84951->84952 84954 42720e 84951->84954 85005 402160 84952->85005 84954->84947 84957 41389e 84955->84957 84962 41381a 84955->84962 84956 4139e8 84982 417f77 46 API calls __getptd_noexit 84956->84982 84957->84956 84959 413a00 84957->84959 84984 417f77 46 API calls __getptd_noexit 84959->84984 84960 4139ed 84983 417f25 10 API calls __wctomb_s_l 84960->84983 84962->84957 84970 41388a 84962->84970 84977 419e30 46 API calls __wctomb_s_l 84962->84977 84964 413909 84966 41396c 84964->84966 84968 413929 84964->84968 84966->84957 84967 413967 84966->84967 84971 41397a 84966->84971 84967->84917 84968->84957 84969 413945 84968->84969 84979 419e30 46 API calls __wctomb_s_l 84968->84979 84969->84957 84969->84967 84974 41395b 84969->84974 84970->84957 84970->84964 84978 419e30 46 API calls __wctomb_s_l 84970->84978 84981 419e30 46 API calls __wctomb_s_l 84971->84981 84980 419e30 46 API calls __wctomb_s_l 84974->84980 84977->84970 84978->84964 84979->84969 84980->84967 84981->84967 84982->84960 84983->84967 84984->84967 84986 419f13 84985->84986 84987 419f0e 84985->84987 84994 417f77 46 API calls __getptd_noexit 84986->84994 84987->84986 84988 419f2b 84987->84988 84993 40e454 84988->84993 84996 417f77 46 API calls __getptd_noexit 84988->84996 84990 419f18 84995 417f25 10 API calls __wctomb_s_l 84990->84995 84993->84920 84994->84990 84995->84993 84996->84990 84998 403367 84997->84998 84999 403358 84997->84999 85000 4115d7 52 API calls 84998->85000 84999->84943 85001 403370 85000->85001 85002 4115d7 52 API calls 85001->85002 85003 40339e 85002->85003 85003->84943 85004->84951 85006 426daa 85005->85006 85007 40216b _wcslen 85005->85007 85020 40c600 85006->85020 85010 402180 85007->85010 85011 40219e 85007->85011 85009 426db5 85009->84954 85018 403bd0 52 API calls moneypunct 85010->85018 85019 4013a0 52 API calls 85011->85019 85014 402187 _memmove 85014->84954 85015 4021a5 85016 426db7 85015->85016 85017 4115d7 52 API calls 85015->85017 85017->85014 85018->85014 85019->85015 85021 40c619 85020->85021 85022 40c60a 85020->85022 85021->85009 85022->85021 85025 4026f0 85022->85025 85024 426d7a _memmove 85024->85009 85026 426873 85025->85026 85027 4026ff 85025->85027 85032 4013a0 52 API calls 85026->85032 85027->85024 85029 42687b 85030 4115d7 52 API calls 85029->85030 85031 42689e _memmove 85030->85031 85031->85024 85032->85029 85033 416454 85070 416c70 85033->85070 85035 416460 GetStartupInfoW 85036 416474 85035->85036 85071 419d5a HeapCreate 85036->85071 85038 4164cd 85039 4164d8 85038->85039 85155 41642b 46 API calls 3 library calls 85038->85155 85072 417c20 GetModuleHandleW 85039->85072 85042 4164de 85043 4164e9 __RTC_Initialize 85042->85043 85156 41642b 46 API calls 3 library calls 85042->85156 85091 41aaa1 GetStartupInfoW 85043->85091 85047 416503 GetCommandLineW 85104 41f584 GetEnvironmentStringsW 85047->85104 85050 416513 85110 41f4d6 GetModuleFileNameW 85050->85110 85053 41651d 85056 416528 85053->85056 85158 411924 46 API calls 3 library calls 85053->85158 85114 41f2a4 85056->85114 85057 41652e 85058 416539 85057->85058 85159 411924 46 API calls 3 library calls 85057->85159 85128 411703 85058->85128 85061 416541 85063 41654c __wwincmdln 85061->85063 85160 411924 46 API calls 3 library calls 85061->85160 85132 40d6b0 85063->85132 85066 41657c 85162 411906 46 API calls _doexit 85066->85162 85069 416581 __setmode 85070->85035 85071->85038 85073 417c34 85072->85073 85074 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 85072->85074 85163 4178ff 49 API calls _free 85073->85163 85076 417c87 TlsAlloc 85074->85076 85079 417cd5 TlsSetValue 85076->85079 85080 417d96 85076->85080 85077 417c39 85077->85042 85079->85080 85081 417ce6 __init_pointers 85079->85081 85080->85042 85164 418151 InitializeCriticalSectionAndSpinCount 85081->85164 85083 417d91 85172 4178ff 49 API calls _free 85083->85172 85085 417d2a 85085->85083 85165 416b49 85085->85165 85088 417d76 85171 41793c 46 API calls 4 library calls 85088->85171 85090 417d7e GetCurrentThreadId 85090->85080 85092 416b49 __calloc_crt 46 API calls 85091->85092 85094 41aabf 85092->85094 85093 4164f7 85093->85047 85157 411924 46 API calls 3 library calls 85093->85157 85094->85093 85096 41ac34 85094->85096 85097 416b49 __calloc_crt 46 API calls 85094->85097 85103 41abb4 85094->85103 85095 41ac6a GetStdHandle 85095->85096 85096->85095 85098 41acce SetHandleCount 85096->85098 85099 41ac7c GetFileType 85096->85099 85102 41aca2 InitializeCriticalSectionAndSpinCount 85096->85102 85097->85094 85098->85093 85099->85096 85100 41abe0 GetFileType 85101 41abeb InitializeCriticalSectionAndSpinCount 85100->85101 85100->85103 85101->85093 85101->85103 85102->85093 85102->85096 85103->85096 85103->85100 85103->85101 85105 41f595 85104->85105 85106 41f599 85104->85106 85105->85050 85182 416b04 85106->85182 85108 41f5c2 FreeEnvironmentStringsW 85108->85050 85109 41f5bb _memmove 85109->85108 85111 41f50b _wparse_cmdline 85110->85111 85112 416b04 __malloc_crt 46 API calls 85111->85112 85113 41f54e _wparse_cmdline 85111->85113 85112->85113 85113->85053 85115 41f2bc _wcslen 85114->85115 85119 41f2b4 85114->85119 85116 416b49 __calloc_crt 46 API calls 85115->85116 85121 41f2e0 _wcslen 85116->85121 85117 41f336 85189 413748 85117->85189 85119->85057 85120 416b49 __calloc_crt 46 API calls 85120->85121 85121->85117 85121->85119 85121->85120 85122 41f35c 85121->85122 85125 41f373 85121->85125 85188 41ef12 46 API calls __wctomb_s_l 85121->85188 85123 413748 _free 46 API calls 85122->85123 85123->85119 85195 417ed3 85125->85195 85127 41f37f 85127->85057 85129 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 85128->85129 85131 411750 __IsNonwritableInCurrentImage 85129->85131 85214 41130a 51 API calls __cinit 85129->85214 85131->85061 85133 42e2f3 85132->85133 85134 40d6cc 85132->85134 85215 408f40 85134->85215 85136 40d707 85219 40ebb0 85136->85219 85139 40d737 85222 411951 85139->85222 85144 40d751 85234 40f4e0 SystemParametersInfoW SystemParametersInfoW 85144->85234 85146 40d75f 85235 40d590 GetCurrentDirectoryW 85146->85235 85148 40d767 SystemParametersInfoW 85149 40d794 85148->85149 85150 40d78d FreeLibrary 85148->85150 85151 408f40 VariantClear 85149->85151 85150->85149 85152 40d79d 85151->85152 85153 408f40 VariantClear 85152->85153 85154 40d7a6 85153->85154 85154->85066 85161 4118da 46 API calls _doexit 85154->85161 85155->85039 85156->85043 85161->85066 85162->85069 85163->85077 85164->85085 85167 416b52 85165->85167 85168 416b8f 85167->85168 85169 416b70 Sleep 85167->85169 85173 41f677 85167->85173 85168->85083 85168->85088 85170 416b85 85169->85170 85170->85167 85170->85168 85171->85090 85172->85080 85174 41f683 85173->85174 85179 41f69e _malloc 85173->85179 85175 41f68f 85174->85175 85174->85179 85181 417f77 46 API calls __getptd_noexit 85175->85181 85176 41f6b1 HeapAlloc 85178 41f6d8 85176->85178 85176->85179 85178->85167 85179->85176 85179->85178 85180 41f694 85180->85167 85181->85180 85185 416b0d 85182->85185 85183 4135bb _malloc 45 API calls 85183->85185 85184 416b43 85184->85109 85185->85183 85185->85184 85186 416b24 Sleep 85185->85186 85187 416b39 85186->85187 85187->85184 85187->85185 85188->85121 85190 413753 RtlFreeHeap 85189->85190 85194 41377c _free 85189->85194 85191 413768 85190->85191 85190->85194 85198 417f77 46 API calls __getptd_noexit 85191->85198 85193 41376e GetLastError 85193->85194 85194->85119 85199 417daa 85195->85199 85198->85193 85200 417dc9 __wctomb_s_l __call_reportfault 85199->85200 85201 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 85200->85201 85202 417eb5 __call_reportfault 85201->85202 85205 41a208 85202->85205 85204 417ed1 GetCurrentProcess TerminateProcess 85204->85127 85206 41a210 85205->85206 85207 41a212 IsDebuggerPresent 85205->85207 85206->85204 85213 41fe19 85207->85213 85210 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 85211 421ff8 GetCurrentProcess TerminateProcess 85210->85211 85212 421ff0 __call_reportfault 85210->85212 85211->85204 85212->85211 85213->85210 85214->85131 85216 408f48 moneypunct 85215->85216 85217 4265c7 VariantClear 85216->85217 85218 408f55 moneypunct 85216->85218 85217->85218 85218->85136 85275 40ebd0 85219->85275 85279 4182cb 85222->85279 85224 41195e 85286 4181f2 LeaveCriticalSection 85224->85286 85226 40d748 85227 4119b0 85226->85227 85228 4119d6 85227->85228 85229 4119bc 85227->85229 85228->85144 85229->85228 85321 417f77 46 API calls __getptd_noexit 85229->85321 85231 4119c6 85322 417f25 10 API calls __wctomb_s_l 85231->85322 85233 4119d1 85233->85144 85234->85146 85323 401f20 85235->85323 85237 40d5b6 IsDebuggerPresent 85238 40d5c4 85237->85238 85239 42e1bb MessageBoxA 85237->85239 85240 42e1d4 85238->85240 85241 40d5e3 85238->85241 85239->85240 85496 403a50 52 API calls 3 library calls 85240->85496 85393 40f520 85241->85393 85245 40d5fd GetFullPathNameW 85405 401460 85245->85405 85247 40d63b 85248 40d643 85247->85248 85249 42e231 SetCurrentDirectoryW 85247->85249 85250 40d64c 85248->85250 85497 432fee 6 API calls 85248->85497 85249->85248 85420 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 85250->85420 85253 42e252 85253->85250 85255 42e25a GetModuleFileNameW 85253->85255 85257 42e274 85255->85257 85258 42e2cb GetForegroundWindow ShellExecuteW 85255->85258 85498 401b10 85257->85498 85260 40d688 85258->85260 85259 40d656 85262 40d669 85259->85262 85494 40e0c0 74 API calls __wctomb_s_l 85259->85494 85267 40d692 SetCurrentDirectoryW 85260->85267 85428 4091e0 85262->85428 85267->85148 85269 42e28d 85505 40d200 52 API calls 2 library calls 85269->85505 85272 42e299 GetForegroundWindow ShellExecuteW 85273 42e2c6 85272->85273 85273->85260 85274 40ec00 LoadLibraryA GetProcAddress 85274->85139 85276 40d72e 85275->85276 85277 40ebd6 LoadLibraryA 85275->85277 85276->85139 85276->85274 85277->85276 85278 40ebe7 GetProcAddress 85277->85278 85278->85276 85280 4182e0 85279->85280 85281 4182f3 EnterCriticalSection 85279->85281 85287 418209 85280->85287 85281->85224 85283 4182e6 85283->85281 85314 411924 46 API calls 3 library calls 85283->85314 85286->85226 85288 418215 __setmode 85287->85288 85289 418225 85288->85289 85290 41823d 85288->85290 85315 418901 46 API calls __NMSG_WRITE 85289->85315 85292 416b04 __malloc_crt 45 API calls 85290->85292 85298 41824b __setmode 85290->85298 85294 418256 85292->85294 85293 41822a 85316 418752 46 API calls 7 library calls 85293->85316 85296 41825d 85294->85296 85297 41826c 85294->85297 85318 417f77 46 API calls __getptd_noexit 85296->85318 85301 4182cb __lock 45 API calls 85297->85301 85298->85283 85299 418231 85317 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 85299->85317 85303 418273 85301->85303 85305 4182a6 85303->85305 85306 41827b InitializeCriticalSectionAndSpinCount 85303->85306 85307 413748 _free 45 API calls 85305->85307 85308 418297 85306->85308 85309 41828b 85306->85309 85307->85308 85320 4182c2 LeaveCriticalSection _doexit 85308->85320 85310 413748 _free 45 API calls 85309->85310 85312 418291 85310->85312 85319 417f77 46 API calls __getptd_noexit 85312->85319 85315->85293 85316->85299 85318->85298 85319->85308 85320->85298 85321->85231 85322->85233 85506 40e6e0 85323->85506 85327 401f41 GetModuleFileNameW 85524 410100 85327->85524 85329 401f5c 85536 410960 85329->85536 85332 401b10 52 API calls 85333 401f81 85332->85333 85539 401980 85333->85539 85335 401f8e 85336 408f40 VariantClear 85335->85336 85337 401f9d 85336->85337 85338 401b10 52 API calls 85337->85338 85339 401fb4 85338->85339 85340 401980 53 API calls 85339->85340 85341 401fc3 85340->85341 85342 401b10 52 API calls 85341->85342 85343 401fd2 85342->85343 85547 40c2c0 85343->85547 85345 401fe1 85346 40bc70 52 API calls 85345->85346 85347 401ff3 85346->85347 85565 401a10 85347->85565 85349 401ffe 85572 4114ab 85349->85572 85352 428b05 85354 401a10 52 API calls 85352->85354 85353 402017 85355 4114ab __wcsicoll 58 API calls 85353->85355 85356 428b18 85354->85356 85357 402022 85355->85357 85359 401a10 52 API calls 85356->85359 85357->85356 85358 40202d 85357->85358 85360 4114ab __wcsicoll 58 API calls 85358->85360 85361 428b33 85359->85361 85362 402038 85360->85362 85364 428b3b GetModuleFileNameW 85361->85364 85363 402043 85362->85363 85362->85364 85365 4114ab __wcsicoll 58 API calls 85363->85365 85366 401a10 52 API calls 85364->85366 85367 40204e 85365->85367 85368 428b6c 85366->85368 85369 402092 85367->85369 85374 401a10 52 API calls 85367->85374 85376 428b90 _wcscpy 85367->85376 85370 40e0a0 52 API calls 85368->85370 85371 4020a3 85369->85371 85369->85376 85372 428b7a 85370->85372 85373 428bc6 85371->85373 85580 40e830 53 API calls 85371->85580 85375 401a10 52 API calls 85372->85375 85378 402073 _wcscpy 85374->85378 85379 428b88 85375->85379 85380 401a10 52 API calls 85376->85380 85384 401a10 52 API calls 85378->85384 85379->85376 85388 4020d0 85380->85388 85381 4020bb 85581 40cf00 53 API calls 85381->85581 85383 4020c6 85385 408f40 VariantClear 85383->85385 85384->85369 85385->85388 85386 402110 85390 408f40 VariantClear 85386->85390 85388->85386 85391 401a10 52 API calls 85388->85391 85582 40cf00 53 API calls 85388->85582 85583 40e6a0 53 API calls 85388->85583 85392 402120 moneypunct 85390->85392 85391->85388 85392->85237 85394 4295c9 __wctomb_s_l 85393->85394 85395 40f53c 85393->85395 85397 4295d9 GetOpenFileNameW 85394->85397 86262 410120 85395->86262 85397->85395 85399 40d5f5 85397->85399 85398 40f545 86266 4102b0 SHGetMalloc 85398->86266 85399->85245 85399->85247 85401 40f54c 86271 410190 GetFullPathNameW 85401->86271 85403 40f559 86282 40f570 85403->86282 86344 402400 85405->86344 85407 40146f 85411 428c29 _wcscat 85407->85411 86353 401500 85407->86353 85409 40147c 85409->85411 86361 40d440 85409->86361 85412 401489 85412->85411 85413 401491 GetFullPathNameW 85412->85413 85414 402160 52 API calls 85413->85414 85415 4014bb 85414->85415 85416 402160 52 API calls 85415->85416 85417 4014c8 85416->85417 85417->85411 85418 402160 52 API calls 85417->85418 85419 4014ee 85418->85419 85419->85247 85421 428361 85420->85421 85422 4103fc LoadImageW RegisterClassExW 85420->85422 86432 44395e EnumResourceNamesW LoadImageW 85421->86432 86431 410490 7 API calls 85422->86431 85425 40d651 85427 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 85425->85427 85426 428368 85427->85259 85429 409202 85428->85429 85430 42d7ad 85428->85430 85473 409216 moneypunct 85429->85473 86695 410940 338 API calls 85429->86695 86698 45e737 90 API calls 3 library calls 85430->86698 85433 409386 85434 40939c 85433->85434 86696 40f190 10 API calls 85433->86696 85434->85260 85495 401000 Shell_NotifyIconW __wctomb_s_l 85434->85495 85436 4095b2 85436->85434 85438 4095bf 85436->85438 85437 409253 PeekMessageW 85437->85473 86697 401a50 338 API calls 85438->86697 85439 40d410 VariantClear 85439->85473 85441 42d8cd Sleep 85441->85473 85442 4095c6 LockWindowUpdate DestroyWindow GetMessageW 85442->85434 85443 4095f9 85442->85443 85447 42e158 TranslateMessage DispatchMessageW GetMessageW 85443->85447 85445 42e13b 86716 40d410 VariantClear 85445->86716 85447->85447 85449 42e188 85447->85449 85449->85434 85451 409567 PeekMessageW 85451->85473 85453 46f3c1 107 API calls 85453->85473 85454 40e0a0 52 API calls 85454->85473 85455 46fdbf 108 API calls 85475 4094e0 85455->85475 85456 409551 TranslateMessage DispatchMessageW 85456->85451 85458 42dcd2 WaitForSingleObject 85463 42dcf0 GetExitCodeProcess CloseHandle 85458->85463 85458->85473 85460 44c29d 52 API calls 85460->85475 85461 42dd3d Sleep 85461->85475 85462 47d33e 316 API calls 85462->85473 86705 40d410 VariantClear 85463->86705 85466 4094cf Sleep 85466->85475 85468 42d94d timeGetTime 86701 465124 53 API calls 85468->86701 85470 40c620 timeGetTime 85470->85475 85472 465124 53 API calls 85472->85475 85473->85433 85473->85437 85473->85439 85473->85441 85473->85445 85473->85451 85473->85453 85473->85454 85473->85456 85473->85458 85473->85461 85473->85462 85473->85466 85473->85468 85473->85475 85484 45e737 90 API calls 85473->85484 85488 42e0cc VariantClear 85473->85488 85489 408f40 VariantClear 85473->85489 86433 4091b0 85473->86433 86491 40afa0 85473->86491 86517 408fc0 85473->86517 86552 408cc0 85473->86552 86566 4096a0 85473->86566 86693 40d150 TranslateAcceleratorW 85473->86693 86694 40d170 IsDialogMessageW GetClassLongW 85473->86694 86699 465124 53 API calls 85473->86699 86700 40c620 timeGetTime 85473->86700 86715 40e270 VariantClear moneypunct 85473->86715 85475->85455 85475->85460 85475->85470 85475->85472 85475->85473 85476 42dd89 CloseHandle 85475->85476 85478 42de19 GetExitCodeProcess CloseHandle 85475->85478 85480 42de88 Sleep 85475->85480 85487 408f40 VariantClear 85475->85487 85491 401980 53 API calls 85475->85491 85492 401b10 52 API calls 85475->85492 86702 45178a 54 API calls 85475->86702 86703 47d33e 338 API calls 85475->86703 86704 453bc6 54 API calls 85475->86704 86706 40d410 VariantClear 85475->86706 86707 443d19 67 API calls _wcslen 85475->86707 86708 4574b4 VariantClear 85475->86708 86709 403cd0 85475->86709 86713 4731e1 VariantClear 85475->86713 86714 4331a2 6 API calls 85475->86714 85476->85475 85478->85475 85480->85473 85484->85473 85487->85475 85488->85473 85489->85473 85491->85475 85492->85475 85494->85262 85495->85260 85496->85247 85497->85253 85499 401b16 _wcslen 85498->85499 85500 4115d7 52 API calls 85499->85500 85503 401b63 85499->85503 85501 401b4b _memmove 85500->85501 85502 4115d7 52 API calls 85501->85502 85502->85503 85504 40d200 52 API calls 2 library calls 85503->85504 85504->85269 85505->85272 85507 40bc70 52 API calls 85506->85507 85508 401f31 85507->85508 85509 402560 85508->85509 85510 40256d __write_nolock 85509->85510 85511 402160 52 API calls 85510->85511 85513 402593 85511->85513 85523 4025bd 85513->85523 85584 401c90 85513->85584 85514 4026f0 52 API calls 85514->85523 85515 4026a7 85516 401b10 52 API calls 85515->85516 85522 4026db 85515->85522 85518 4026d1 85516->85518 85517 401b10 52 API calls 85517->85523 85588 40d7c0 52 API calls 2 library calls 85518->85588 85519 401c90 52 API calls 85519->85523 85522->85327 85523->85514 85523->85515 85523->85517 85523->85519 85587 40d7c0 52 API calls 2 library calls 85523->85587 85589 40f760 85524->85589 85527 410118 85527->85329 85529 42805d 85530 42806a 85529->85530 85645 431e58 85529->85645 85532 413748 _free 46 API calls 85530->85532 85533 428078 85532->85533 85534 431e58 82 API calls 85533->85534 85535 428084 85534->85535 85535->85329 85537 4115d7 52 API calls 85536->85537 85538 401f74 85537->85538 85538->85332 85540 4019a3 85539->85540 85545 401985 85539->85545 85541 4019b8 85540->85541 85540->85545 86251 403e10 53 API calls 85541->86251 85543 40199f 85543->85335 85544 4019c4 85544->85335 85545->85543 86250 403e10 53 API calls 85545->86250 85548 40c2c7 85547->85548 85549 40c30e 85547->85549 85550 40c2d3 85548->85550 85551 426c79 85548->85551 85552 40c315 85549->85552 85553 426c2b 85549->85553 86252 403ea0 52 API calls __cinit 85550->86252 86257 4534e3 52 API calls 85551->86257 85557 40c321 85552->85557 85558 426c5a 85552->85558 85555 426c4b 85553->85555 85556 426c2e 85553->85556 86255 4534e3 52 API calls 85555->86255 85564 40c2de 85556->85564 86254 4534e3 52 API calls 85556->86254 86253 403ea0 52 API calls __cinit 85557->86253 86256 4534e3 52 API calls 85558->86256 85564->85345 85564->85564 85566 401a30 85565->85566 85567 401a17 85565->85567 85569 402160 52 API calls 85566->85569 85568 401a2d 85567->85568 86258 403c30 52 API calls _memmove 85567->86258 85568->85349 85571 401a3d 85569->85571 85571->85349 85573 411523 85572->85573 85574 4114ba 85572->85574 86261 4113a8 58 API calls 3 library calls 85573->86261 85579 40200c 85574->85579 86259 417f77 46 API calls __getptd_noexit 85574->86259 85577 4114c6 86260 417f25 10 API calls __wctomb_s_l 85577->86260 85579->85352 85579->85353 85580->85381 85581->85383 85582->85388 85583->85388 85585 4026f0 52 API calls 85584->85585 85586 401c97 85585->85586 85586->85513 85587->85523 85588->85522 85649 40f6f0 85589->85649 85591 40f77b _strcat moneypunct 85657 40f850 85591->85657 85596 427c2a 85686 414d04 85596->85686 85598 40f7fc 85598->85596 85600 40f804 85598->85600 85673 414a46 85600->85673 85604 40f80e 85604->85527 85608 4528bd 85604->85608 85605 427c59 85692 414fe2 85605->85692 85607 427c79 85609 4150d1 _fseek 81 API calls 85608->85609 85610 452930 85609->85610 86192 452719 85610->86192 85613 452948 85613->85529 85614 414d04 __fread_nolock 61 API calls 85615 452966 85614->85615 85616 414d04 __fread_nolock 61 API calls 85615->85616 85617 452976 85616->85617 85618 414d04 __fread_nolock 61 API calls 85617->85618 85619 45298f 85618->85619 85620 414d04 __fread_nolock 61 API calls 85619->85620 85621 4529aa 85620->85621 85622 4150d1 _fseek 81 API calls 85621->85622 85623 4529c4 85622->85623 85624 4135bb _malloc 46 API calls 85623->85624 85625 4529cf 85624->85625 85626 4135bb _malloc 46 API calls 85625->85626 85627 4529db 85626->85627 85628 414d04 __fread_nolock 61 API calls 85627->85628 85629 4529ec 85628->85629 85630 44afef GetSystemTimeAsFileTime 85629->85630 85631 452a00 85630->85631 85632 452a36 85631->85632 85633 452a13 85631->85633 85635 452aa5 85632->85635 85636 452a3c 85632->85636 85634 413748 _free 46 API calls 85633->85634 85638 452a1c 85634->85638 85637 413748 _free 46 API calls 85635->85637 86198 44b1a9 85636->86198 85641 452aa3 85637->85641 85642 413748 _free 46 API calls 85638->85642 85640 452a9d 85643 413748 _free 46 API calls 85640->85643 85641->85529 85644 452a25 85642->85644 85643->85641 85644->85529 85646 431e64 85645->85646 85647 431e6a 85645->85647 85648 414a46 __fcloseall 82 API calls 85646->85648 85647->85530 85648->85647 85650 425de2 85649->85650 85654 40f6fc _wcslen 85649->85654 85650->85591 85651 40f710 WideCharToMultiByte 85652 40f756 85651->85652 85653 40f728 85651->85653 85652->85591 85655 4115d7 52 API calls 85653->85655 85654->85651 85656 40f735 WideCharToMultiByte 85655->85656 85656->85591 85658 40f85d __wctomb_s_l _strlen 85657->85658 85660 40f7ab 85658->85660 85705 414db8 85658->85705 85661 4149c2 85660->85661 85720 414904 85661->85720 85663 40f7e9 85663->85596 85664 40f5c0 85663->85664 85669 40f5cd _strcat __write_nolock _memmove 85664->85669 85665 414d04 __fread_nolock 61 API calls 85665->85669 85667 425d11 85668 4150d1 _fseek 81 API calls 85667->85668 85670 425d33 85668->85670 85669->85665 85669->85667 85672 40f691 __tzset_nolock 85669->85672 85808 4150d1 85669->85808 85671 414d04 __fread_nolock 61 API calls 85670->85671 85671->85672 85672->85598 85674 414a52 __setmode 85673->85674 85675 414a64 85674->85675 85676 414a79 85674->85676 85948 417f77 46 API calls __getptd_noexit 85675->85948 85678 415471 __lock_file 47 API calls 85676->85678 85683 414a74 __setmode 85676->85683 85680 414a92 85678->85680 85679 414a69 85949 417f25 10 API calls __wctomb_s_l 85679->85949 85932 4149d9 85680->85932 85683->85604 86017 414c76 85686->86017 85688 414d1c 85689 44afef 85688->85689 86185 442c5a 85689->86185 85691 44b00d 85691->85605 85693 414fee __setmode 85692->85693 85694 414ffa 85693->85694 85695 41500f 85693->85695 86189 417f77 46 API calls __getptd_noexit 85694->86189 85696 415471 __lock_file 47 API calls 85695->85696 85698 415017 85696->85698 85700 414e4e __ftell_nolock 51 API calls 85698->85700 85699 414fff 86190 417f25 10 API calls __wctomb_s_l 85699->86190 85703 415024 85700->85703 85702 41500a __setmode 85702->85607 86191 41503d LeaveCriticalSection LeaveCriticalSection _fseek 85703->86191 85706 414dd6 85705->85706 85707 414deb 85705->85707 85716 417f77 46 API calls __getptd_noexit 85706->85716 85707->85706 85709 414df2 85707->85709 85718 41b91b 79 API calls 11 library calls 85709->85718 85710 414ddb 85717 417f25 10 API calls __wctomb_s_l 85710->85717 85713 414e18 85714 414de6 85713->85714 85719 418f98 77 API calls 7 library calls 85713->85719 85714->85658 85716->85710 85717->85714 85718->85713 85719->85714 85723 414910 __setmode 85720->85723 85721 414923 85776 417f77 46 API calls __getptd_noexit 85721->85776 85723->85721 85725 414951 85723->85725 85724 414928 85777 417f25 10 API calls __wctomb_s_l 85724->85777 85739 41d4d1 85725->85739 85728 414956 85729 41496a 85728->85729 85730 41495d 85728->85730 85732 414992 85729->85732 85733 414972 85729->85733 85778 417f77 46 API calls __getptd_noexit 85730->85778 85756 41d218 85732->85756 85779 417f77 46 API calls __getptd_noexit 85733->85779 85736 414933 @_EH4_CallFilterFunc@8 __setmode 85736->85663 85740 41d4dd __setmode 85739->85740 85741 4182cb __lock 46 API calls 85740->85741 85753 41d4eb 85741->85753 85742 41d560 85781 41d5fb 85742->85781 85743 41d567 85745 416b04 __malloc_crt 46 API calls 85743->85745 85747 41d56e 85745->85747 85746 41d5f0 __setmode 85746->85728 85747->85742 85748 41d57c InitializeCriticalSectionAndSpinCount 85747->85748 85750 41d59c 85748->85750 85751 41d5af EnterCriticalSection 85748->85751 85754 413748 _free 46 API calls 85750->85754 85751->85742 85752 418209 __mtinitlocknum 46 API calls 85752->85753 85753->85742 85753->85743 85753->85752 85784 4154b2 47 API calls __lock 85753->85784 85785 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85753->85785 85754->85742 85757 41d23a 85756->85757 85758 41d255 85757->85758 85769 41d26c __wopenfile 85757->85769 85790 417f77 46 API calls __getptd_noexit 85758->85790 85760 41d25a 85791 417f25 10 API calls __wctomb_s_l 85760->85791 85762 41d47a 85795 417f77 46 API calls __getptd_noexit 85762->85795 85763 41d48c 85787 422bf9 85763->85787 85766 41499d 85780 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 85766->85780 85767 41d47f 85796 417f25 10 API calls __wctomb_s_l 85767->85796 85769->85762 85775 41d421 85769->85775 85792 41341f 58 API calls 2 library calls 85769->85792 85771 41d41a 85771->85775 85793 41341f 58 API calls 2 library calls 85771->85793 85773 41d439 85773->85775 85794 41341f 58 API calls 2 library calls 85773->85794 85775->85762 85775->85763 85776->85724 85777->85736 85778->85736 85779->85736 85780->85736 85786 4181f2 LeaveCriticalSection 85781->85786 85783 41d602 85783->85746 85784->85753 85785->85753 85786->85783 85797 422b35 85787->85797 85789 422c14 85789->85766 85790->85760 85791->85766 85792->85771 85793->85773 85794->85775 85795->85767 85796->85766 85799 422b41 __setmode 85797->85799 85798 422b54 85800 417f77 __wctomb_s_l 46 API calls 85798->85800 85799->85798 85801 422b8a 85799->85801 85802 422b59 85800->85802 85803 422400 __tsopen_nolock 109 API calls 85801->85803 85804 417f25 __wctomb_s_l 10 API calls 85802->85804 85805 422ba4 85803->85805 85807 422b63 __setmode 85804->85807 85806 422bcb __wsopen_helper LeaveCriticalSection 85805->85806 85806->85807 85807->85789 85809 4150dd __setmode 85808->85809 85810 4150e9 85809->85810 85811 41510f 85809->85811 85839 417f77 46 API calls __getptd_noexit 85810->85839 85821 415471 85811->85821 85814 4150ee 85840 417f25 10 API calls __wctomb_s_l 85814->85840 85820 4150f9 __setmode 85820->85669 85822 415483 85821->85822 85823 4154a5 EnterCriticalSection 85821->85823 85822->85823 85824 41548b 85822->85824 85826 415117 85823->85826 85825 4182cb __lock 46 API calls 85824->85825 85825->85826 85827 415047 85826->85827 85828 415067 85827->85828 85829 415057 85827->85829 85834 415079 85828->85834 85842 414e4e 85828->85842 85897 417f77 46 API calls __getptd_noexit 85829->85897 85833 41505c 85841 415143 LeaveCriticalSection LeaveCriticalSection _fseek 85833->85841 85859 41443c 85834->85859 85837 4150b9 85872 41e1f4 85837->85872 85839->85814 85840->85820 85841->85820 85843 414e61 85842->85843 85844 414e79 85842->85844 85898 417f77 46 API calls __getptd_noexit 85843->85898 85846 414139 __fputwc_nolock 46 API calls 85844->85846 85848 414e80 85846->85848 85847 414e66 85899 417f25 10 API calls __wctomb_s_l 85847->85899 85850 41e1f4 __write 51 API calls 85848->85850 85851 414e97 85850->85851 85852 414f09 85851->85852 85854 414ec9 85851->85854 85858 414e71 85851->85858 85900 417f77 46 API calls __getptd_noexit 85852->85900 85855 41e1f4 __write 51 API calls 85854->85855 85854->85858 85856 414f64 85855->85856 85857 41e1f4 __write 51 API calls 85856->85857 85856->85858 85857->85858 85858->85834 85860 414477 85859->85860 85861 414455 85859->85861 85865 414139 85860->85865 85861->85860 85862 414139 __fputwc_nolock 46 API calls 85861->85862 85863 414470 85862->85863 85901 41b7b2 77 API calls 6 library calls 85863->85901 85866 414145 85865->85866 85867 41415a 85865->85867 85902 417f77 46 API calls __getptd_noexit 85866->85902 85867->85837 85869 41414a 85903 417f25 10 API calls __wctomb_s_l 85869->85903 85871 414155 85871->85837 85873 41e200 __setmode 85872->85873 85874 41e223 85873->85874 85875 41e208 85873->85875 85876 41e22f 85874->85876 85881 41e269 85874->85881 85924 417f8a 46 API calls __getptd_noexit 85875->85924 85926 417f8a 46 API calls __getptd_noexit 85876->85926 85879 41e20d 85925 417f77 46 API calls __getptd_noexit 85879->85925 85880 41e234 85927 417f77 46 API calls __getptd_noexit 85880->85927 85904 41ae56 85881->85904 85885 41e23c 85928 417f25 10 API calls __wctomb_s_l 85885->85928 85886 41e26f 85888 41e291 85886->85888 85889 41e27d 85886->85889 85929 417f77 46 API calls __getptd_noexit 85888->85929 85914 41e17f 85889->85914 85891 41e215 __setmode 85891->85833 85893 41e296 85930 417f8a 46 API calls __getptd_noexit 85893->85930 85894 41e289 85931 41e2c0 LeaveCriticalSection __unlock_fhandle 85894->85931 85897->85833 85898->85847 85899->85858 85900->85858 85901->85860 85902->85869 85903->85871 85905 41ae62 __setmode 85904->85905 85906 41aebc 85905->85906 85908 4182cb __lock 46 API calls 85905->85908 85907 41aec1 EnterCriticalSection 85906->85907 85911 41aede __setmode 85906->85911 85907->85911 85909 41ae8e 85908->85909 85910 41ae97 InitializeCriticalSectionAndSpinCount 85909->85910 85912 41aeaa 85909->85912 85910->85912 85911->85886 85913 41aeec ___lock_fhandle LeaveCriticalSection 85912->85913 85913->85906 85915 41aded __lseek_nolock 46 API calls 85914->85915 85916 41e18e 85915->85916 85917 41e1a4 SetFilePointer 85916->85917 85918 41e194 85916->85918 85920 41e1bb GetLastError 85917->85920 85921 41e1c3 85917->85921 85919 417f77 __wctomb_s_l 46 API calls 85918->85919 85922 41e199 85919->85922 85920->85921 85921->85922 85923 417f9d __dosmaperr 46 API calls 85921->85923 85922->85894 85923->85922 85924->85879 85925->85891 85926->85880 85927->85885 85928->85891 85929->85893 85930->85894 85931->85891 85933 4149ea 85932->85933 85934 4149fe 85932->85934 85978 417f77 46 API calls __getptd_noexit 85933->85978 85937 41443c __flush 77 API calls 85934->85937 85940 4149fa 85934->85940 85936 4149ef 85979 417f25 10 API calls __wctomb_s_l 85936->85979 85939 414a0a 85937->85939 85951 41d8c2 85939->85951 85950 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 85940->85950 85943 414139 __fputwc_nolock 46 API calls 85944 414a18 85943->85944 85955 41d7fe 85944->85955 85946 414a1e 85946->85940 85947 413748 _free 46 API calls 85946->85947 85947->85940 85948->85679 85949->85683 85950->85683 85952 414a12 85951->85952 85953 41d8d2 85951->85953 85952->85943 85953->85952 85954 413748 _free 46 API calls 85953->85954 85954->85952 85956 41d80a __setmode 85955->85956 85957 41d812 85956->85957 85958 41d82d 85956->85958 85995 417f8a 46 API calls __getptd_noexit 85957->85995 85960 41d839 85958->85960 85963 41d873 85958->85963 85997 417f8a 46 API calls __getptd_noexit 85960->85997 85961 41d817 85996 417f77 46 API calls __getptd_noexit 85961->85996 85966 41ae56 ___lock_fhandle 48 API calls 85963->85966 85965 41d83e 85998 417f77 46 API calls __getptd_noexit 85965->85998 85969 41d879 85966->85969 85967 41d81f __setmode 85967->85946 85972 41d893 85969->85972 85973 41d887 85969->85973 85970 41d846 85999 417f25 10 API calls __wctomb_s_l 85970->85999 86000 417f77 46 API calls __getptd_noexit 85972->86000 85980 41d762 85973->85980 85976 41d88d 86001 41d8ba LeaveCriticalSection __unlock_fhandle 85976->86001 85978->85936 85979->85940 86002 41aded 85980->86002 85982 41d7c8 86015 41ad67 47 API calls 2 library calls 85982->86015 85983 41d772 85983->85982 85986 41aded __lseek_nolock 46 API calls 85983->85986 85994 41d7a6 85983->85994 85985 41d7d0 85988 41d7f2 85985->85988 86016 417f9d 46 API calls 3 library calls 85985->86016 85989 41d79d 85986->85989 85987 41aded __lseek_nolock 46 API calls 85990 41d7b2 CloseHandle 85987->85990 85988->85976 85992 41aded __lseek_nolock 46 API calls 85989->85992 85990->85982 85993 41d7be GetLastError 85990->85993 85992->85994 85993->85982 85994->85982 85994->85987 85995->85961 85996->85967 85997->85965 85998->85970 85999->85967 86000->85976 86001->85967 86003 41ae12 86002->86003 86004 41adfa 86002->86004 86006 417f8a __set_osfhnd 46 API calls 86003->86006 86010 41ae51 86003->86010 86005 417f8a __set_osfhnd 46 API calls 86004->86005 86007 41adff 86005->86007 86009 41ae23 86006->86009 86008 417f77 __wctomb_s_l 46 API calls 86007->86008 86012 41ae07 86008->86012 86011 417f77 __wctomb_s_l 46 API calls 86009->86011 86010->85983 86013 41ae2b 86011->86013 86012->85983 86014 417f25 __wctomb_s_l 10 API calls 86013->86014 86014->86012 86015->85985 86016->85988 86018 414c82 __setmode 86017->86018 86019 414cc3 86018->86019 86020 414c96 __wctomb_s_l 86018->86020 86029 414cbb __setmode 86018->86029 86021 415471 __lock_file 47 API calls 86019->86021 86044 417f77 46 API calls __getptd_noexit 86020->86044 86022 414ccb 86021->86022 86030 414aba 86022->86030 86025 414cb0 86045 417f25 10 API calls __wctomb_s_l 86025->86045 86029->85688 86031 414af2 86030->86031 86034 414ad8 __wctomb_s_l 86030->86034 86046 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 86031->86046 86032 414ae2 86097 417f77 46 API calls __getptd_noexit 86032->86097 86034->86031 86034->86032 86037 414b2d 86034->86037 86037->86031 86038 414139 __fputwc_nolock 46 API calls 86037->86038 86041 414c38 __wctomb_s_l 86037->86041 86047 41dfcc 86037->86047 86077 41d8f3 86037->86077 86099 41e0c2 46 API calls 2 library calls 86037->86099 86038->86037 86100 417f77 46 API calls __getptd_noexit 86041->86100 86043 414ae7 86098 417f25 10 API calls __wctomb_s_l 86043->86098 86044->86025 86045->86029 86046->86029 86048 41dfd8 __setmode 86047->86048 86049 41dfe0 86048->86049 86050 41dffb 86048->86050 86170 417f8a 46 API calls __getptd_noexit 86049->86170 86051 41e007 86050->86051 86057 41e041 86050->86057 86172 417f8a 46 API calls __getptd_noexit 86051->86172 86053 41dfe5 86171 417f77 46 API calls __getptd_noexit 86053->86171 86056 41e00c 86173 417f77 46 API calls __getptd_noexit 86056->86173 86058 41e063 86057->86058 86059 41e04e 86057->86059 86062 41ae56 ___lock_fhandle 48 API calls 86058->86062 86175 417f8a 46 API calls __getptd_noexit 86059->86175 86065 41e069 86062->86065 86063 41e014 86174 417f25 10 API calls __wctomb_s_l 86063->86174 86064 41e053 86176 417f77 46 API calls __getptd_noexit 86064->86176 86068 41e077 86065->86068 86069 41e08b 86065->86069 86067 41dfed __setmode 86067->86037 86101 41da15 86068->86101 86177 417f77 46 API calls __getptd_noexit 86069->86177 86073 41e083 86179 41e0ba LeaveCriticalSection __unlock_fhandle 86073->86179 86074 41e090 86178 417f8a 46 API calls __getptd_noexit 86074->86178 86078 41d900 86077->86078 86081 41d915 86077->86081 86183 417f77 46 API calls __getptd_noexit 86078->86183 86080 41d905 86184 417f25 10 API calls __wctomb_s_l 86080->86184 86083 41d94a 86081->86083 86088 41d910 86081->86088 86180 420603 86081->86180 86085 414139 __fputwc_nolock 46 API calls 86083->86085 86086 41d95e 86085->86086 86087 41dfcc __read 59 API calls 86086->86087 86089 41d965 86087->86089 86088->86037 86089->86088 86090 414139 __fputwc_nolock 46 API calls 86089->86090 86091 41d988 86090->86091 86091->86088 86092 414139 __fputwc_nolock 46 API calls 86091->86092 86093 41d994 86092->86093 86093->86088 86094 414139 __fputwc_nolock 46 API calls 86093->86094 86095 41d9a1 86094->86095 86096 414139 __fputwc_nolock 46 API calls 86095->86096 86096->86088 86097->86043 86098->86031 86099->86037 86100->86043 86102 41da31 86101->86102 86103 41da4c 86101->86103 86104 417f8a __set_osfhnd 46 API calls 86102->86104 86105 41da5b 86103->86105 86107 41da7a 86103->86107 86106 41da36 86104->86106 86108 417f8a __set_osfhnd 46 API calls 86105->86108 86111 417f77 __wctomb_s_l 46 API calls 86106->86111 86110 41da98 86107->86110 86124 41daac 86107->86124 86109 41da60 86108->86109 86112 417f77 __wctomb_s_l 46 API calls 86109->86112 86113 417f8a __set_osfhnd 46 API calls 86110->86113 86121 41da3e 86111->86121 86115 41da67 86112->86115 86117 41da9d 86113->86117 86114 41db02 86116 417f8a __set_osfhnd 46 API calls 86114->86116 86118 417f25 __wctomb_s_l 10 API calls 86115->86118 86119 41db07 86116->86119 86120 417f77 __wctomb_s_l 46 API calls 86117->86120 86118->86121 86122 417f77 __wctomb_s_l 46 API calls 86119->86122 86123 41daa4 86120->86123 86121->86073 86122->86123 86126 417f25 __wctomb_s_l 10 API calls 86123->86126 86124->86114 86124->86121 86125 41dae1 86124->86125 86127 41db1b 86124->86127 86125->86114 86129 41daec ReadFile 86125->86129 86126->86121 86128 416b04 __malloc_crt 46 API calls 86127->86128 86131 41db31 86128->86131 86132 41dc17 86129->86132 86133 41df8f GetLastError 86129->86133 86136 41db59 86131->86136 86137 41db3b 86131->86137 86132->86133 86140 41dc2b 86132->86140 86134 41de16 86133->86134 86135 41df9c 86133->86135 86144 417f9d __dosmaperr 46 API calls 86134->86144 86149 41dd9b 86134->86149 86138 417f77 __wctomb_s_l 46 API calls 86135->86138 86141 420494 __lseeki64_nolock 48 API calls 86136->86141 86139 417f77 __wctomb_s_l 46 API calls 86137->86139 86142 41dfa1 86138->86142 86143 41db40 86139->86143 86140->86149 86150 41dc47 86140->86150 86153 41de5b 86140->86153 86145 41db67 86141->86145 86146 417f8a __set_osfhnd 46 API calls 86142->86146 86147 417f8a __set_osfhnd 46 API calls 86143->86147 86144->86149 86145->86129 86146->86149 86147->86121 86148 413748 _free 46 API calls 86148->86121 86149->86121 86149->86148 86151 41dcab ReadFile 86150->86151 86160 41dd28 86150->86160 86154 41dcc9 GetLastError 86151->86154 86163 41dcd3 86151->86163 86152 41ded0 ReadFile 86155 41deef GetLastError 86152->86155 86161 41def9 86152->86161 86153->86149 86153->86152 86154->86150 86154->86163 86155->86153 86155->86161 86156 41ddec MultiByteToWideChar 86156->86149 86157 41de10 GetLastError 86156->86157 86157->86134 86158 41dda3 86166 41dd60 86158->86166 86167 41ddda 86158->86167 86159 41dd96 86162 417f77 __wctomb_s_l 46 API calls 86159->86162 86160->86149 86160->86158 86160->86159 86160->86166 86161->86153 86165 420494 __lseeki64_nolock 48 API calls 86161->86165 86162->86149 86163->86150 86164 420494 __lseeki64_nolock 48 API calls 86163->86164 86164->86163 86165->86161 86166->86156 86168 420494 __lseeki64_nolock 48 API calls 86167->86168 86169 41dde9 86168->86169 86169->86156 86170->86053 86171->86067 86172->86056 86173->86063 86174->86067 86175->86064 86176->86063 86177->86074 86178->86073 86179->86067 86181 416b04 __malloc_crt 46 API calls 86180->86181 86182 420618 86181->86182 86182->86083 86183->86080 86184->86088 86188 4148b3 GetSystemTimeAsFileTime __aulldiv 86185->86188 86187 442c6b 86187->85691 86188->86187 86189->85699 86190->85702 86191->85702 86196 45272f __tzset_nolock _wcscpy 86192->86196 86193 414d04 61 API calls __fread_nolock 86193->86196 86194 44afef GetSystemTimeAsFileTime 86194->86196 86195 4528a4 86195->85613 86195->85614 86196->86193 86196->86194 86196->86195 86197 4150d1 81 API calls _fseek 86196->86197 86197->86196 86199 44b1bc 86198->86199 86200 44b1ca 86198->86200 86201 4149c2 116 API calls 86199->86201 86202 44b1e1 86200->86202 86203 4149c2 116 API calls 86200->86203 86204 44b1d8 86200->86204 86201->86200 86233 4321a4 86202->86233 86205 44b2db 86203->86205 86204->85640 86205->86202 86207 44b2e9 86205->86207 86209 44b2f6 86207->86209 86212 414a46 __fcloseall 82 API calls 86207->86212 86208 44b224 86210 44b253 86208->86210 86211 44b228 86208->86211 86209->85640 86237 43213d 86210->86237 86214 44b235 86211->86214 86217 414a46 __fcloseall 82 API calls 86211->86217 86212->86209 86215 44b245 86214->86215 86218 414a46 __fcloseall 82 API calls 86214->86218 86215->85640 86216 44b25a 86219 44b260 86216->86219 86220 44b289 86216->86220 86217->86214 86218->86215 86222 44b26d 86219->86222 86224 414a46 __fcloseall 82 API calls 86219->86224 86247 44b0bf 87 API calls 86220->86247 86225 44b27d 86222->86225 86227 414a46 __fcloseall 82 API calls 86222->86227 86223 44b28f 86248 4320f8 46 API calls _free 86223->86248 86224->86222 86225->85640 86227->86225 86228 44b295 86229 44b2a2 86228->86229 86230 414a46 __fcloseall 82 API calls 86228->86230 86231 44b2b2 86229->86231 86232 414a46 __fcloseall 82 API calls 86229->86232 86230->86229 86231->85640 86232->86231 86234 4321b4 __tzset_nolock _memmove 86233->86234 86235 4321cb 86233->86235 86234->86208 86236 414d04 __fread_nolock 61 API calls 86235->86236 86236->86234 86238 4135bb _malloc 46 API calls 86237->86238 86239 432150 86238->86239 86240 4135bb _malloc 46 API calls 86239->86240 86241 432162 86240->86241 86242 4135bb _malloc 46 API calls 86241->86242 86243 432174 86242->86243 86245 432189 86243->86245 86249 4320f8 46 API calls _free 86243->86249 86245->86216 86246 432198 86246->86216 86247->86223 86248->86228 86249->86246 86250->85543 86251->85544 86252->85564 86253->85564 86254->85564 86255->85558 86256->85564 86257->85564 86258->85568 86259->85577 86260->85579 86261->85579 86311 410160 86262->86311 86264 41012f GetFullPathNameW 86265 410147 moneypunct 86264->86265 86265->85398 86267 4102cb SHGetDesktopFolder 86266->86267 86270 410333 _wcsncpy 86266->86270 86268 4102e0 _wcsncpy 86267->86268 86267->86270 86269 41031c SHGetPathFromIDListW 86268->86269 86268->86270 86269->86270 86270->85401 86272 4101bb 86271->86272 86277 425f4a 86271->86277 86273 410160 52 API calls 86272->86273 86274 4101c7 86273->86274 86315 410200 52 API calls 2 library calls 86274->86315 86275 4114ab __wcsicoll 58 API calls 86275->86277 86277->86275 86279 425f6e 86277->86279 86278 4101d6 86316 410200 52 API calls 2 library calls 86278->86316 86279->85403 86281 4101e9 86281->85403 86283 40f760 128 API calls 86282->86283 86284 40f584 86283->86284 86285 429335 86284->86285 86286 40f58c 86284->86286 86289 4528bd 118 API calls 86285->86289 86287 40f598 86286->86287 86288 429358 86286->86288 86341 4033c0 113 API calls 7 library calls 86287->86341 86342 434034 86 API calls _wprintf 86288->86342 86291 42934b 86289->86291 86295 429373 86291->86295 86296 42934f 86291->86296 86293 429369 86293->86295 86294 40f5b4 86294->85399 86297 4115d7 52 API calls 86295->86297 86298 431e58 82 API calls 86296->86298 86299 4293c5 moneypunct 86297->86299 86298->86288 86300 42959c 86299->86300 86308 401b10 52 API calls 86299->86308 86317 444af8 86299->86317 86320 44b41c 86299->86320 86327 402780 86299->86327 86335 4022d0 86299->86335 86343 44c7dd 64 API calls 3 library calls 86299->86343 86301 413748 _free 46 API calls 86300->86301 86302 4295a5 86301->86302 86303 431e58 82 API calls 86302->86303 86304 4295b1 86303->86304 86308->86299 86312 410167 _wcslen 86311->86312 86313 4115d7 52 API calls 86312->86313 86314 41017e _wcscpy 86313->86314 86314->86264 86315->86278 86316->86281 86318 4115d7 52 API calls 86317->86318 86319 444b27 _memmove 86318->86319 86319->86299 86322 44b429 86320->86322 86321 4115d7 52 API calls 86323 44b440 86321->86323 86322->86321 86324 44b45e 86323->86324 86325 401b10 52 API calls 86323->86325 86324->86299 86326 44b453 86325->86326 86326->86299 86328 402827 86327->86328 86331 402790 moneypunct _memmove 86327->86331 86330 4115d7 52 API calls 86328->86330 86329 4115d7 52 API calls 86332 402797 86329->86332 86330->86331 86331->86329 86333 4027bd 86332->86333 86334 4115d7 52 API calls 86332->86334 86333->86299 86334->86333 86336 4022e0 86335->86336 86338 40239d 86335->86338 86337 4115d7 52 API calls 86336->86337 86336->86338 86339 402320 moneypunct 86336->86339 86337->86339 86338->86299 86339->86338 86340 4115d7 52 API calls 86339->86340 86340->86339 86341->86294 86342->86293 86343->86299 86345 402539 moneypunct 86344->86345 86346 402417 86344->86346 86345->85407 86346->86345 86347 4115d7 52 API calls 86346->86347 86348 402443 86347->86348 86349 4115d7 52 API calls 86348->86349 86350 4024b4 86349->86350 86350->86345 86352 4022d0 52 API calls 86350->86352 86373 402880 86350->86373 86352->86350 86358 401566 86353->86358 86354 401794 86425 40e9a0 90 API calls 86354->86425 86357 4010a0 52 API calls 86357->86358 86358->86354 86358->86357 86359 40167a 86358->86359 86360 4017c0 86359->86360 86426 45e737 90 API calls 3 library calls 86359->86426 86360->85409 86362 40bc70 52 API calls 86361->86362 86371 40d451 86362->86371 86363 40d50f 86429 410600 52 API calls 86363->86429 86365 427c01 86430 45e737 90 API calls 3 library calls 86365->86430 86366 40e0a0 52 API calls 86366->86371 86368 401b10 52 API calls 86368->86371 86369 40d519 86369->85412 86371->86363 86371->86365 86371->86366 86371->86368 86371->86369 86427 40f310 53 API calls 86371->86427 86428 40d860 91 API calls 86371->86428 86374 4115d7 52 API calls 86373->86374 86375 4028b3 86374->86375 86376 4115d7 52 API calls 86375->86376 86385 4028c5 moneypunct _memmove 86376->86385 86377 402780 52 API calls 86378 402b1e moneypunct 86377->86378 86378->86350 86379 427d62 86382 403350 52 API calls 86379->86382 86381 402bb6 86416 403060 53 API calls 86381->86416 86395 427d6b 86382->86395 86384 402aeb moneypunct 86384->86377 86390 42802b moneypunct 86384->86390 86385->86379 86385->86381 86385->86384 86389 403350 52 API calls 86385->86389 86397 427fd5 86385->86397 86398 427f2c 86385->86398 86399 402780 52 API calls 86385->86399 86403 427fa5 86385->86403 86404 402f00 52 API calls 86385->86404 86406 428000 86385->86406 86408 4026f0 52 API calls 86385->86408 86414 4115d7 52 API calls 86385->86414 86415 4031b0 63 API calls 86385->86415 86417 402f80 92 API calls _memmove 86385->86417 86418 402280 52 API calls 86385->86418 86420 4013a0 52 API calls 86385->86420 86386 402bca 86387 427f63 86386->86387 86388 402bd4 86386->86388 86422 460879 92 API calls 3 library calls 86387->86422 86391 402780 52 API calls 86388->86391 86389->86385 86394 402bdf 86391->86394 86394->86350 86395->86398 86419 403020 52 API calls _memmove 86395->86419 86423 460879 92 API calls 3 library calls 86397->86423 86421 460879 92 API calls 3 library calls 86398->86421 86399->86385 86402 427fe4 86410 402780 52 API calls 86402->86410 86411 402780 52 API calls 86403->86411 86404->86385 86424 460879 92 API calls 3 library calls 86406->86424 86409 402a85 CharUpperBuffW 86408->86409 86409->86385 86413 427f48 86410->86413 86411->86378 86413->86378 86414->86385 86415->86385 86416->86386 86417->86385 86418->86385 86419->86395 86420->86385 86421->86413 86422->86413 86423->86402 86424->86378 86425->86359 86426->86360 86427->86371 86428->86371 86429->86369 86430->86369 86431->85425 86432->85426 86434 42c5fe 86433->86434 86449 4091c6 86433->86449 86435 40bc70 52 API calls 86434->86435 86434->86449 86436 42c64e InterlockedIncrement 86435->86436 86437 42c665 86436->86437 86442 42c697 86436->86442 86439 42c672 InterlockedDecrement Sleep InterlockedIncrement 86437->86439 86437->86442 86438 42c737 InterlockedDecrement 86440 42c74a 86438->86440 86439->86437 86439->86442 86443 408f40 VariantClear 86440->86443 86441 42c731 86441->86438 86442->86438 86442->86441 86717 408e80 86442->86717 86445 42c752 86443->86445 86730 410c60 VariantClear moneypunct 86445->86730 86449->85473 86450 42c6db 86451 402160 52 API calls 86450->86451 86452 42c6e5 86451->86452 86453 45340c 85 API calls 86452->86453 86454 42c6f1 86453->86454 86727 40d200 52 API calls 2 library calls 86454->86727 86456 42c6fb 86728 465124 53 API calls 86456->86728 86458 42c715 86459 42c76a 86458->86459 86460 42c719 86458->86460 86461 401b10 52 API calls 86459->86461 86729 46fe32 VariantClear 86460->86729 86463 42c77e 86461->86463 86464 401980 53 API calls 86463->86464 86469 42c796 86464->86469 86465 42c812 86732 46fe32 VariantClear 86465->86732 86467 42c82a InterlockedDecrement 86733 46ff07 54 API calls 86467->86733 86469->86465 86471 42c864 86469->86471 86731 40ba10 52 API calls 2 library calls 86469->86731 86470 42c849 86473 42c9ec 86470->86473 86479 408f40 VariantClear 86470->86479 86482 402780 52 API calls 86470->86482 86488 401980 53 API calls 86470->86488 86736 40a780 86470->86736 86734 45e737 90 API calls 3 library calls 86471->86734 86777 47d33e 338 API calls 86473->86777 86476 42c9fe 86778 46feb1 VariantClear VariantClear 86476->86778 86478 42c874 86481 408f40 VariantClear 86478->86481 86490 42ca59 86478->86490 86479->86470 86480 42ca08 86483 401b10 52 API calls 86480->86483 86485 42c891 86481->86485 86482->86470 86484 42ca15 86483->86484 86735 410c60 VariantClear moneypunct 86485->86735 86488->86470 86490->86490 86492 40afc4 86491->86492 86493 40b156 86491->86493 86494 40afd5 86492->86494 86495 42d1e3 86492->86495 86789 45e737 90 API calls 3 library calls 86493->86789 86500 40a780 201 API calls 86494->86500 86511 40b11a moneypunct 86494->86511 86790 45e737 90 API calls 3 library calls 86495->86790 86498 42d1f8 86504 408f40 VariantClear 86498->86504 86499 40b143 86499->85473 86502 40b00a 86500->86502 86502->86498 86505 40b012 86502->86505 86503 42d4db 86503->86503 86504->86499 86506 40b04a 86505->86506 86508 42d231 VariantClear 86505->86508 86514 40b094 moneypunct 86505->86514 86512 40b05c moneypunct 86506->86512 86791 40e270 VariantClear moneypunct 86506->86791 86507 40b108 86507->86511 86792 40e270 VariantClear moneypunct 86507->86792 86508->86512 86509 42d45a VariantClear 86509->86511 86510 42d425 moneypunct 86510->86509 86510->86511 86511->86499 86793 45e737 90 API calls 3 library calls 86511->86793 86512->86514 86516 4115d7 52 API calls 86512->86516 86514->86507 86514->86510 86516->86514 86518 408fff 86517->86518 86531 40900d 86517->86531 86794 403ea0 52 API calls __cinit 86518->86794 86521 42c3f6 86797 45e737 90 API calls 3 library calls 86521->86797 86523 40a780 201 API calls 86523->86531 86524 42c44a 86799 45e737 90 API calls 3 library calls 86524->86799 86526 42c47b 86800 451b42 61 API calls 86526->86800 86528 42c4cb 86802 47faae 240 API calls 86528->86802 86529 42c564 86534 408f40 VariantClear 86529->86534 86531->86521 86531->86523 86531->86524 86531->86526 86531->86528 86531->86529 86533 42c548 86531->86533 86537 409112 86531->86537 86538 42c528 86531->86538 86540 4090df 86531->86540 86545 4090ea 86531->86545 86547 4090f2 moneypunct 86531->86547 86796 4534e3 52 API calls 86531->86796 86798 40c4e0 201 API calls 86531->86798 86805 45e737 90 API calls 3 library calls 86533->86805 86534->86547 86535 42c491 86535->86547 86801 45e737 90 API calls 3 library calls 86535->86801 86536 42c4da 86536->86547 86803 45e737 90 API calls 3 library calls 86536->86803 86537->86533 86543 40912b 86537->86543 86804 45e737 90 API calls 3 library calls 86538->86804 86540->86545 86546 408e80 VariantClear 86540->86546 86543->86547 86795 403e10 53 API calls 86543->86795 86548 408f40 VariantClear 86545->86548 86546->86545 86547->85473 86548->86547 86550 40914b 86551 408f40 VariantClear 86550->86551 86551->86547 86806 408d90 86552->86806 86554 429778 86836 410c60 VariantClear moneypunct 86554->86836 86556 429780 86557 408cf9 86557->86554 86558 42976c 86557->86558 86560 408d2d 86557->86560 86835 45e737 90 API calls 3 library calls 86558->86835 86822 403d10 86560->86822 86563 408d71 moneypunct 86563->85473 86564 408f40 VariantClear 86565 408d45 moneypunct 86564->86565 86565->86563 86565->86564 86567 4096c6 _wcslen 86566->86567 86568 4115d7 52 API calls 86567->86568 86631 40a70c moneypunct _memmove 86567->86631 86569 4096fa _memmove 86568->86569 86571 4115d7 52 API calls 86569->86571 86573 40971b 86571->86573 86572 4297aa 86575 4115d7 52 API calls 86572->86575 86574 409749 CharUpperBuffW 86573->86574 86577 40976a moneypunct 86573->86577 86573->86631 86574->86577 86617 4297d1 _memmove 86575->86617 86624 4097e5 moneypunct 86577->86624 87133 47dcbb 203 API calls 86577->87133 86579 42a452 86580 408f40 VariantClear 86579->86580 86581 42ae92 86580->86581 87160 410c60 VariantClear moneypunct 86581->87160 86583 42aea4 86584 409aa2 86586 4115d7 52 API calls 86584->86586 86591 409afe 86584->86591 86584->86617 86585 40a689 86588 4115d7 52 API calls 86585->86588 86586->86591 86587 4115d7 52 API calls 86587->86624 86605 40a6af moneypunct _memmove 86588->86605 86589 409b2a 86593 429dbe 86589->86593 86654 409b4d moneypunct _memmove 86589->86654 87141 40b400 VariantClear VariantClear moneypunct 86589->87141 86590 40c2c0 52 API calls 86590->86624 86591->86589 86592 4115d7 52 API calls 86591->86592 86594 429d31 86592->86594 86599 429dd3 86593->86599 87142 40b400 VariantClear VariantClear moneypunct 86593->87142 86598 429d42 86594->86598 87138 44a801 52 API calls 86594->87138 86595 429a46 VariantClear 86595->86624 86596 409fd2 86603 40a045 86596->86603 86653 42a3f5 86596->86653 86609 40e0a0 52 API calls 86598->86609 86599->86654 87143 40e1c0 VariantClear moneypunct 86599->87143 86600 408f40 VariantClear 86600->86624 86607 4115d7 52 API calls 86603->86607 86613 4115d7 52 API calls 86605->86613 86614 40a04c 86607->86614 86615 429d57 86609->86615 86611 42a42f 87147 45e737 90 API calls 3 library calls 86611->87147 86613->86631 86616 40a0a7 86614->86616 86621 4091e0 324 API calls 86614->86621 87139 453443 52 API calls 86615->87139 86639 40a0af 86616->86639 87148 40c790 VariantClear moneypunct 86616->87148 87159 45e737 90 API calls 3 library calls 86617->87159 86618 4299d9 86623 408f40 VariantClear 86618->86623 86620 429d88 87140 453443 52 API calls 86620->87140 86621->86616 86622 429abd 86622->85473 86625 4299e2 86623->86625 86624->86579 86624->86584 86624->86585 86624->86587 86624->86590 86624->86595 86624->86600 86624->86605 86624->86617 86624->86618 86624->86622 86629 40a780 201 API calls 86624->86629 87134 40c4e0 201 API calls 86624->87134 87136 40ba10 52 API calls 2 library calls 86624->87136 87137 40e270 VariantClear moneypunct 86624->87137 87135 410c60 VariantClear moneypunct 86625->87135 86629->86624 87132 4013a0 52 API calls 86631->87132 86633 402780 52 API calls 86633->86654 86634 4115d7 52 API calls 86634->86654 86636 44a801 52 API calls 86636->86654 86637 408f40 VariantClear 86667 40a162 moneypunct _memmove 86637->86667 86638 41130a 51 API calls __cinit 86638->86654 86640 40a11b 86639->86640 86641 42a4b4 VariantClear 86639->86641 86639->86667 86647 40a12d moneypunct 86640->86647 87149 40e270 VariantClear moneypunct 86640->87149 86641->86647 86642 40a780 201 API calls 86642->86654 86644 401980 53 API calls 86644->86654 86645 408e80 VariantClear 86645->86654 86646 4115d7 52 API calls 86646->86667 86647->86646 86647->86667 86648 408e80 VariantClear 86648->86667 86650 42a74d VariantClear 86650->86667 86651 40a368 86652 42aad4 86651->86652 86661 40a397 86651->86661 87152 46fe90 VariantClear VariantClear moneypunct 86652->87152 87146 47390f VariantClear 86653->87146 86654->86596 86654->86611 86654->86631 86654->86633 86654->86634 86654->86636 86654->86638 86654->86642 86654->86644 86654->86645 86654->86653 86657 409c95 86654->86657 87144 45f508 52 API calls 86654->87144 87145 403e10 53 API calls 86654->87145 86655 42a886 VariantClear 86655->86667 86656 42a7e4 VariantClear 86656->86667 86657->85473 86658 40a3ce 86672 40a3d9 moneypunct 86658->86672 87153 40b400 VariantClear VariantClear moneypunct 86658->87153 86660 40e270 VariantClear 86660->86667 86661->86658 86684 40a42c moneypunct 86661->86684 87131 40b400 VariantClear VariantClear moneypunct 86661->87131 86664 4115d7 52 API calls 86664->86667 86665 42abaf 86669 42abd4 VariantClear 86665->86669 86679 40a4ee moneypunct 86665->86679 86666 4115d7 52 API calls 86670 42a5a6 VariantInit VariantCopy 86666->86670 86667->86637 86667->86648 86667->86650 86667->86651 86667->86652 86667->86655 86667->86656 86667->86660 86667->86664 86667->86666 87150 470870 52 API calls 86667->87150 87151 44ccf1 VariantClear moneypunct 86667->87151 86668 40a4dc 86668->86679 87155 40e270 VariantClear moneypunct 86668->87155 86669->86679 86670->86667 86674 42a5c6 VariantClear 86670->86674 86673 40a41a 86672->86673 86677 42ab44 VariantClear 86672->86677 86672->86684 86673->86684 87154 40e270 VariantClear moneypunct 86673->87154 86674->86667 86675 42ac4f 86680 42ac79 VariantClear 86675->86680 86687 40a546 moneypunct 86675->86687 86676 40a534 86676->86687 87156 40e270 VariantClear moneypunct 86676->87156 86677->86684 86679->86675 86679->86676 86680->86687 86681 42ad28 86686 42ad4e VariantClear 86681->86686 86692 40a583 moneypunct 86681->86692 86683 40a571 86683->86692 87157 40e270 VariantClear moneypunct 86683->87157 86684->86665 86684->86668 86686->86692 86687->86681 86687->86683 86689 40a650 moneypunct 86689->85473 86690 42ae0e VariantClear 86690->86692 86692->86689 86692->86690 87158 40e270 VariantClear moneypunct 86692->87158 86693->85473 86694->85473 86695->85473 86696->85436 86697->85442 86698->85473 86699->85473 86700->85473 86701->85473 86702->85475 86703->85475 86704->85475 86705->85475 86706->85475 86707->85475 86708->85475 86710 403cdf 86709->86710 86711 408f40 VariantClear 86710->86711 86712 403ce7 86711->86712 86712->85480 86713->85475 86714->85475 86715->85473 86716->85433 86718 408e88 86717->86718 86720 408e94 86717->86720 86719 408f40 VariantClear 86718->86719 86719->86720 86721 45340c 86720->86721 86722 453439 86721->86722 86723 453419 86721->86723 86722->86450 86724 45342f 86723->86724 86779 4531b1 85 API calls 5 library calls 86723->86779 86724->86450 86726 453425 86726->86450 86727->86456 86728->86458 86729->86441 86730->86449 86731->86469 86732->86467 86733->86470 86734->86478 86735->86449 86737 40a7a6 86736->86737 86738 40ae8c 86736->86738 86740 4115d7 52 API calls 86737->86740 86780 41130a 51 API calls __cinit 86738->86780 86774 40a7c6 moneypunct _memmove 86740->86774 86741 40a86d 86742 40abd1 86741->86742 86758 40a878 moneypunct 86741->86758 86785 45e737 90 API calls 3 library calls 86742->86785 86743 408e80 VariantClear 86743->86774 86745 401b10 52 API calls 86745->86774 86746 42b791 VariantClear 86746->86774 86747 40bc10 53 API calls 86747->86774 86748 408f40 VariantClear 86748->86758 86749 4115d7 52 API calls 86749->86774 86750 42ba2d VariantClear 86750->86774 86751 40e270 VariantClear 86751->86774 86752 42b459 VariantClear 86752->86774 86753 40a884 moneypunct 86753->86470 86754 42b6f6 VariantClear 86754->86774 86755 408cc0 194 API calls 86755->86774 86757 42bc5b 86757->86470 86758->86748 86758->86753 86759 42bbf5 86786 45e737 90 API calls 3 library calls 86759->86786 86760 42bb6a 86788 44b92d VariantClear 86760->86788 86761 4115d7 52 API calls 86764 42b5b3 VariantInit VariantCopy 86761->86764 86762 40b5f0 89 API calls 86762->86774 86767 42b5d7 VariantClear 86764->86767 86764->86774 86766 408f40 VariantClear 86766->86774 86767->86774 86770 42bc37 86787 45e737 90 API calls 3 library calls 86770->86787 86773 42bc48 86773->86760 86775 408f40 VariantClear 86773->86775 86774->86741 86774->86742 86774->86743 86774->86745 86774->86746 86774->86747 86774->86749 86774->86750 86774->86751 86774->86752 86774->86754 86774->86755 86774->86759 86774->86760 86774->86761 86774->86762 86774->86766 86774->86770 86776 4530c9 VariantClear 86774->86776 86781 45308a 53 API calls 86774->86781 86782 470870 52 API calls 86774->86782 86783 457f66 87 API calls __write_nolock 86774->86783 86784 472f47 127 API calls 86774->86784 86775->86760 86776->86774 86777->86476 86778->86480 86779->86726 86780->86774 86781->86774 86782->86774 86783->86774 86784->86774 86785->86760 86786->86760 86787->86773 86788->86757 86789->86495 86790->86498 86791->86512 86792->86511 86793->86503 86794->86531 86795->86550 86796->86531 86797->86547 86798->86531 86799->86547 86800->86535 86801->86547 86802->86536 86803->86547 86804->86547 86805->86529 86807 4289d2 86806->86807 86808 408db3 86806->86808 86839 45e737 90 API calls 3 library calls 86807->86839 86837 40bec0 90 API calls 86808->86837 86811 408dc9 86812 4289e5 86811->86812 86814 428a05 86811->86814 86817 40a780 201 API calls 86811->86817 86818 408e64 86811->86818 86820 408f40 VariantClear 86811->86820 86821 408e5a 86811->86821 86838 40ba10 52 API calls 2 library calls 86811->86838 86840 45e737 90 API calls 3 library calls 86812->86840 86816 408f40 VariantClear 86814->86816 86816->86821 86817->86811 86819 408f40 VariantClear 86818->86819 86819->86821 86820->86811 86821->86557 86823 408f40 VariantClear 86822->86823 86824 403d20 86823->86824 86825 403cd0 VariantClear 86824->86825 86826 403d4d 86825->86826 86841 4813fa 86826->86841 86851 40de10 86826->86851 86856 4013c0 86826->86856 86861 4755ad 86826->86861 86864 45e17d 86826->86864 86874 46e91c 86826->86874 86877 467897 86826->86877 86827 403d76 86827->86554 86827->86565 86835->86554 86836->86556 86837->86811 86838->86811 86839->86812 86840->86814 86842 45340c 85 API calls 86841->86842 86843 481438 86842->86843 86844 402880 95 API calls 86843->86844 86845 48143f 86844->86845 86846 481465 86845->86846 86847 40a780 201 API calls 86845->86847 86850 481469 86846->86850 86921 40e710 53 API calls 86846->86921 86847->86846 86849 4814a4 86849->86827 86850->86827 86852 4115d7 52 API calls 86851->86852 86853 40de23 86852->86853 86922 40da20 86853->86922 86855 40de2e 86855->86827 86857 4115d7 52 API calls 86856->86857 86858 4013e4 86857->86858 86926 4013a0 52 API calls 86858->86926 86860 4013f3 86860->86827 86927 475077 86861->86927 86863 4755c0 86863->86827 86865 45e198 86864->86865 86866 45e19c 86865->86866 86867 45e1b8 86865->86867 86868 408f40 VariantClear 86866->86868 86869 45e1cc 86867->86869 86870 45e1db FindClose 86867->86870 86871 45e1a4 86868->86871 86872 45e1d9 moneypunct 86869->86872 87033 44ae3e 86869->87033 86870->86872 86871->86827 86872->86827 87042 46e785 86874->87042 86876 46e92f 86876->86827 86878 4678bb 86877->86878 86879 467954 86878->86879 86881 45340c 85 API calls 86878->86881 86880 4115d7 52 API calls 86879->86880 86907 467964 86879->86907 86882 467989 86880->86882 86884 4678f6 86881->86884 86883 467995 86882->86883 87129 40da60 53 API calls 86882->87129 86887 4533eb 85 API calls 86883->86887 86886 413a0e __wsplitpath 46 API calls 86884->86886 86888 4678fc 86886->86888 86889 4679b7 86887->86889 86890 401b10 52 API calls 86888->86890 86891 40de40 60 API calls 86889->86891 86892 46790c 86890->86892 86893 4679c3 86891->86893 87126 40d200 52 API calls 2 library calls 86892->87126 86895 4679c7 GetLastError 86893->86895 86896 467a05 86893->86896 86897 403cd0 VariantClear 86895->86897 86899 467a2c 86896->86899 86900 467a4b 86896->86900 86901 4679dc 86897->86901 86898 467917 86898->86879 87127 4339fa GetFileAttributesW FindFirstFileW FindClose 86898->87127 86903 4115d7 52 API calls 86899->86903 86904 4115d7 52 API calls 86900->86904 86905 4679e6 86901->86905 86910 44ae3e CloseHandle 86901->86910 86908 467a31 86903->86908 86909 467a49 86904->86909 86912 408f40 VariantClear 86905->86912 86906 467928 86906->86879 86911 46792f 86906->86911 86907->86827 87130 436299 52 API calls 2 library calls 86908->87130 86917 408f40 VariantClear 86909->86917 86910->86905 87128 4335cd 56 API calls 3 library calls 86911->87128 86913 4679ed 86912->86913 86913->86827 86916 467939 86916->86879 86919 408f40 VariantClear 86916->86919 86918 467a88 86917->86918 86918->86827 86920 467947 86919->86920 86920->86879 86921->86849 86923 40da37 86922->86923 86924 40da29 86922->86924 86923->86924 86925 40da3c CloseHandle 86923->86925 86924->86855 86925->86855 86926->86860 86980 4533eb 86927->86980 86930 4750ee 86932 408f40 VariantClear 86930->86932 86931 475129 86984 4646e0 86931->86984 86937 4750f5 86932->86937 86934 47515e 86935 475162 86934->86935 86944 47518e 86934->86944 86936 408f40 VariantClear 86935->86936 86954 475169 86936->86954 86937->86863 86938 475365 87018 44b3ac 57 API calls 86938->87018 86939 4754ea 87024 464812 92 API calls 86939->87024 86943 475374 86997 430d31 86943->86997 86946 4533eb 85 API calls 86944->86946 86956 475480 86944->86956 86965 475357 86944->86965 86967 4754b5 86944->86967 87016 436299 52 API calls 2 library calls 86944->87016 87017 463ad5 64 API calls __wcsicoll 86944->87017 86945 4754fc 86945->86943 86947 475508 86945->86947 86946->86944 86948 408f40 VariantClear 86947->86948 86950 47550f 86948->86950 86950->86954 86951 475388 87004 4577e9 86951->87004 86954->86863 86958 408f40 VariantClear 86956->86958 86958->86954 86965->86938 86965->86939 86968 408f40 VariantClear 86967->86968 86968->86954 86981 453404 86980->86981 86982 4533f8 86980->86982 86981->86930 86981->86931 86982->86981 87027 4531b1 85 API calls 5 library calls 86982->87027 87028 4536f7 53 API calls 86984->87028 86986 4646fc 87029 4426cd 59 API calls _wcslen 86986->87029 86988 464711 86990 40bc70 52 API calls 86988->86990 86996 46474b 86988->86996 86991 46472c 86990->86991 87030 461465 52 API calls _memmove 86991->87030 86993 464741 86994 40c600 52 API calls 86993->86994 86994->86996 86995 464793 86995->86934 86996->86995 87031 463ad5 64 API calls __wcsicoll 86996->87031 86998 430db2 86997->86998 86999 430d54 86997->86999 86998->86951 87000 4115d7 52 API calls 86999->87000 87001 430d74 87000->87001 87016->86944 87017->86944 87018->86943 87024->86945 87027->86981 87028->86986 87029->86988 87030->86993 87031->86995 87035 44ae4b moneypunct 87033->87035 87036 443fdf 87033->87036 87035->86872 87037 40da20 CloseHandle 87036->87037 87038 443feb 87037->87038 87041 4340db CloseHandle moneypunct 87038->87041 87040 444001 87040->87035 87041->87040 87043 46e7a2 87042->87043 87044 4115d7 52 API calls 87043->87044 87047 46e802 87043->87047 87045 46e7ad 87044->87045 87046 46e7b9 87045->87046 87090 40da60 53 API calls 87045->87090 87052 4533eb 85 API calls 87046->87052 87048 46e7e5 87047->87048 87055 46e82f 87047->87055 87049 408f40 VariantClear 87048->87049 87051 46e7ea 87049->87051 87051->86876 87053 46e7ca 87052->87053 87091 40de40 87053->87091 87054 46e8b5 87083 4680ed 87054->87083 87055->87054 87058 46e845 87055->87058 87061 4533eb 85 API calls 87058->87061 87060 46e8bb 87087 443fbe 87060->87087 87068 46e84b 87061->87068 87062 46e7db 87062->87048 87064 44ae3e CloseHandle 87062->87064 87063 46e87a 87103 4689f4 59 API calls 87063->87103 87064->87048 87065 46e883 87069 4013c0 52 API calls 87065->87069 87068->87063 87068->87065 87071 46e88f 87069->87071 87072 40e0a0 52 API calls 87071->87072 87074 46e899 87072->87074 87073 408f40 VariantClear 87081 46e881 87073->87081 87104 40d200 52 API calls 2 library calls 87074->87104 87075 46e911 87075->86876 87077 46e8a5 87105 4689f4 59 API calls 87077->87105 87078 40da20 CloseHandle 87080 46e903 87078->87080 87082 44ae3e CloseHandle 87080->87082 87081->87075 87081->87078 87082->87075 87084 468100 87083->87084 87085 4680fa 87083->87085 87084->87060 87106 467ac4 55 API calls 2 library calls 87085->87106 87107 443e36 87087->87107 87089 443fd3 87089->87073 87089->87081 87090->87046 87092 40da20 CloseHandle 87091->87092 87093 40de4e 87092->87093 87114 40f110 87093->87114 87096 4264fa 87098 40de84 87123 40e080 SetFilePointerEx SetFilePointerEx 87098->87123 87100 40de8b 87124 40f160 SetFilePointerEx SetFilePointerEx WriteFile 87100->87124 87102 40de90 87102->87055 87102->87062 87103->87081 87104->87077 87105->87081 87106->87084 87110 443e19 87107->87110 87111 443e26 87110->87111 87112 443e32 WriteFile 87110->87112 87113 443db4 SetFilePointerEx SetFilePointerEx 87111->87113 87112->87089 87113->87112 87115 40f125 CreateFileW 87114->87115 87116 42630c 87114->87116 87118 40de74 87115->87118 87117 426311 CreateFileW 87116->87117 87116->87118 87117->87118 87119 426337 87117->87119 87118->87096 87122 40dea0 55 API calls moneypunct 87118->87122 87125 40df90 SetFilePointerEx SetFilePointerEx 87119->87125 87121 426342 87121->87118 87122->87098 87123->87100 87124->87102 87125->87121 87126->86898 87127->86906 87128->86916 87129->86883 87130->86909 87131->86658 87132->86572 87133->86577 87134->86624 87135->86689 87136->86624 87137->86624 87138->86598 87139->86620 87140->86589 87141->86593 87142->86599 87143->86654 87144->86654 87145->86654 87146->86611 87147->86579 87148->86616 87149->86647 87150->86667 87151->86667 87152->86658 87153->86672 87154->86684 87155->86679 87156->86687 87157->86692 87158->86692 87159->86579 87160->86583 87161 42d154 87165 480a8d 87161->87165 87163 42d161 87164 480a8d 201 API calls 87163->87164 87164->87163 87166 480ae4 87165->87166 87167 480b26 87165->87167 87168 480aeb 87166->87168 87169 480b15 87166->87169 87170 40bc70 52 API calls 87167->87170 87171 480aee 87168->87171 87172 480b04 87168->87172 87198 4805bf 201 API calls 87169->87198 87194 480b2e 87170->87194 87171->87167 87174 480af3 87171->87174 87197 47fea2 201 API calls __itow_s 87172->87197 87196 47f135 201 API calls 87174->87196 87177 40e0a0 52 API calls 87177->87194 87179 408f40 VariantClear 87182 481156 87179->87182 87180 40c2c0 52 API calls 87180->87194 87181 480aff 87181->87179 87183 408f40 VariantClear 87182->87183 87184 48115e 87183->87184 87184->87163 87185 480ff5 87204 45e737 90 API calls 3 library calls 87185->87204 87186 40e710 53 API calls 87186->87194 87187 401980 53 API calls 87187->87194 87189 408e80 VariantClear 87189->87194 87190 40a780 201 API calls 87190->87194 87194->87177 87194->87180 87194->87181 87194->87185 87194->87186 87194->87187 87194->87189 87194->87190 87199 45377f 52 API calls 87194->87199 87200 45e951 53 API calls 87194->87200 87201 40e830 53 API calls 87194->87201 87202 47925f 53 API calls 87194->87202 87203 47fcff 201 API calls 87194->87203 87196->87181 87197->87181 87198->87181 87199->87194 87200->87194 87201->87194 87202->87194 87203->87194 87204->87181 87205 42b14b 87212 40bc10 87205->87212 87207 42b159 87208 4096a0 338 API calls 87207->87208 87209 42b177 87208->87209 87223 44b92d VariantClear 87209->87223 87211 42bc5b 87213 40bc24 87212->87213 87214 40bc17 87212->87214 87216 40bc2a 87213->87216 87217 40bc3c 87213->87217 87215 408e80 VariantClear 87214->87215 87218 40bc1f 87215->87218 87219 408e80 VariantClear 87216->87219 87220 4115d7 52 API calls 87217->87220 87218->87207 87221 40bc33 87219->87221 87222 40bc43 87220->87222 87221->87207 87222->87207 87223->87211 87224 425b2b 87229 40f000 87224->87229 87228 425b3a 87230 4115d7 52 API calls 87229->87230 87231 40f007 87230->87231 87232 4276ea 87231->87232 87238 40f030 87231->87238 87237 41130a 51 API calls __cinit 87237->87228 87239 40f039 87238->87239 87241 40f01a 87238->87241 87268 41130a 51 API calls __cinit 87239->87268 87242 40e500 87241->87242 87243 40bc70 52 API calls 87242->87243 87244 40e515 GetVersionExW 87243->87244 87245 402160 52 API calls 87244->87245 87246 40e557 87245->87246 87269 40e660 87246->87269 87252 427674 87256 4276c6 GetSystemInfo 87252->87256 87254 40e5e0 87258 4276d5 GetSystemInfo 87254->87258 87283 40efd0 87254->87283 87255 40e5cd GetCurrentProcess 87290 40ef20 LoadLibraryA GetProcAddress 87255->87290 87256->87258 87261 40e629 87287 40ef90 87261->87287 87264 40e641 FreeLibrary 87265 40e644 87264->87265 87266 40e653 FreeLibrary 87265->87266 87267 40e656 87265->87267 87266->87267 87267->87237 87268->87241 87270 40e667 87269->87270 87271 42761d 87270->87271 87272 40c600 52 API calls 87270->87272 87273 40e55c 87272->87273 87274 40e680 87273->87274 87275 40e687 87274->87275 87276 427616 87275->87276 87277 40c600 52 API calls 87275->87277 87278 40e566 87277->87278 87278->87252 87279 40ef60 87278->87279 87280 40e5c8 87279->87280 87281 40ef66 LoadLibraryA 87279->87281 87280->87254 87280->87255 87281->87280 87282 40ef77 GetProcAddress 87281->87282 87282->87280 87284 40e620 87283->87284 87285 40efd6 LoadLibraryA 87283->87285 87284->87256 87284->87261 87285->87284 87286 40efe7 GetProcAddress 87285->87286 87286->87284 87291 40efb0 LoadLibraryA GetProcAddress 87287->87291 87289 40e632 GetNativeSystemInfo 87289->87264 87289->87265 87290->87254 87291->87289 87292 425b5e 87297 40c7f0 87292->87297 87296 425b6d 87332 40db10 52 API calls 87297->87332 87299 40c82a 87333 410ab0 6 API calls 87299->87333 87301 40c86d 87302 40bc70 52 API calls 87301->87302 87303 40c877 87302->87303 87304 40bc70 52 API calls 87303->87304 87305 40c881 87304->87305 87306 40bc70 52 API calls 87305->87306 87307 40c88b 87306->87307 87308 40bc70 52 API calls 87307->87308 87309 40c8d1 87308->87309 87310 40bc70 52 API calls 87309->87310 87311 40c991 87310->87311 87334 40d2c0 52 API calls 87311->87334 87313 40c99b 87335 40d0d0 53 API calls 87313->87335 87315 40c9c1 87316 40bc70 52 API calls 87315->87316 87317 40c9cb 87316->87317 87336 40e310 53 API calls 87317->87336 87319 40ca28 87320 408f40 VariantClear 87319->87320 87321 40ca30 87320->87321 87322 408f40 VariantClear 87321->87322 87323 40ca38 GetStdHandle 87322->87323 87324 429630 87323->87324 87325 40ca87 87323->87325 87324->87325 87326 429639 87324->87326 87331 41130a 51 API calls __cinit 87325->87331 87337 4432c0 57 API calls 87326->87337 87328 429641 87338 44b6ab CreateThread 87328->87338 87330 42964f CloseHandle 87330->87325 87331->87296 87332->87299 87333->87301 87334->87313 87335->87315 87336->87319 87337->87328 87338->87330 87339 44b5cb 58 API calls 87338->87339 87340 425b6f 87345 40dc90 87340->87345 87344 425b7e 87346 40bc70 52 API calls 87345->87346 87347 40dd03 87346->87347 87353 40f210 87347->87353 87349 40dd96 87351 40ddb7 87349->87351 87356 40dc00 52 API calls 2 library calls 87349->87356 87352 41130a 51 API calls __cinit 87351->87352 87352->87344 87357 40f250 RegOpenKeyExW 87353->87357 87355 40f230 87355->87349 87356->87349 87358 425e17 87357->87358 87359 40f275 RegQueryValueExW 87357->87359 87358->87355 87360 40f2c3 RegCloseKey 87359->87360 87361 40f298 87359->87361 87360->87355 87362 40f2a9 RegCloseKey 87361->87362 87363 425e1d 87361->87363 87362->87355 87364 427d438 87378 427b008 87364->87378 87366 427d4d4 87381 427d328 87366->87381 87380 427b693 87378->87380 87384 427e518 GetPEB 87378->87384 87380->87366 87382 427d331 Sleep 87381->87382 87383 427d33f 87382->87383 87384->87380
                                      APIs
                                      • _wcslen.LIBCMT ref: 004096C1
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • _memmove.LIBCMT ref: 0040970C
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                      • _memmove.LIBCMT ref: 00409D96
                                      • _memmove.LIBCMT ref: 0040A6C4
                                      • _memmove.LIBCMT ref: 004297E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                      • String ID:
                                      • API String ID: 2383988440-0
                                      • Opcode ID: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                      • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                      • Opcode Fuzzy Hash: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                      • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                        • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                        • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                      • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                      • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                        • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                      • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                      • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                        • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                        • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                        • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                        • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                        • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                        • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                      Strings
                                      • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                      • runas, xrefs: 0042E2AD, 0042E2DC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                      • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                      • API String ID: 2495805114-3383388033
                                      • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                      • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                      • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                      • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1919 427693-427696 1915->1919 1920 427688-427691 1915->1920 1924 4276b4-4276be 1916->1924 1921 427625-427629 1917->1921 1922 40e59c-40e59f 1917->1922 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1919->1924 1927 427698-4276a8 1919->1927 1920->1924 1929 427636-427640 1921->1929 1930 42762b-427631 1921->1930 1925 40e5a5-40e5ae 1922->1925 1926 427654-427657 1922->1926 1937 4276c6-4276ca GetSystemInfo 1924->1937 1931 40e5b4 1925->1931 1932 427645-42764f 1925->1932 1926->1918 1938 42765d-42766f 1926->1938 1933 4276b0 1927->1933 1934 4276aa-4276ae 1927->1934 1929->1918 1930->1918 1931->1918 1932->1918 1933->1924 1934->1924 1940 40e612-40e623 call 40efd0 1935->1940 1941 4276d5-4276df GetSystemInfo 1935->1941 1936->1935 1948 40e5e8 1936->1948 1937->1941 1938->1918 1940->1937 1945 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1945 1950 40e641-40e642 FreeLibrary 1945->1950 1951 40e644-40e651 1945->1951 1948->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                      APIs
                                      • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                      • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                      • FreeLibrary.KERNEL32(?), ref: 0040E642
                                      • FreeLibrary.KERNEL32(?), ref: 0040E654
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                      • String ID: 0SH
                                      • API String ID: 3363477735-851180471
                                      • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                      • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                      • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                      • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                      APIs
                                      • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: IsThemeActive$uxtheme.dll
                                      • API String ID: 2574300362-3542929980
                                      • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                      • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                      • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                      • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                      APIs
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                      • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                      • TranslateMessage.USER32(?), ref: 00409556
                                      • DispatchMessageW.USER32(?), ref: 00409561
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Message$Peek$DispatchSleepTranslate
                                      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                      • API String ID: 1762048999-758534266
                                      • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                      • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                      • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                      • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • __wcsicoll.LIBCMT ref: 00402007
                                      • __wcsicoll.LIBCMT ref: 0040201D
                                      • __wcsicoll.LIBCMT ref: 00402033
                                        • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                      • __wcsicoll.LIBCMT ref: 00402049
                                      • _wcscpy.LIBCMT ref: 0040207C
                                      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                      • API String ID: 3948761352-1609664196
                                      • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                      • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                      • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                      • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                      • __wsplitpath.LIBCMT ref: 0040E41C
                                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                      • _wcsncat.LIBCMT ref: 0040E433
                                      • __wmakepath.LIBCMT ref: 0040E44F
                                        • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                      • _wcscpy.LIBCMT ref: 0040E487
                                        • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                      • _wcscat.LIBCMT ref: 00427541
                                      • _wcslen.LIBCMT ref: 00427551
                                      • _wcslen.LIBCMT ref: 00427562
                                      • _wcscat.LIBCMT ref: 0042757C
                                      • _wcsncpy.LIBCMT ref: 004275BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                      • String ID: Include$\
                                      • API String ID: 3173733714-3429789819
                                      • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                      • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                      • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                      • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                      Control-flow Graph

                                      APIs
                                      • _fseek.LIBCMT ref: 0045292B
                                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                      • __fread_nolock.LIBCMT ref: 00452961
                                      • __fread_nolock.LIBCMT ref: 00452971
                                      • __fread_nolock.LIBCMT ref: 0045298A
                                      • __fread_nolock.LIBCMT ref: 004529A5
                                      • _fseek.LIBCMT ref: 004529BF
                                      • _malloc.LIBCMT ref: 004529CA
                                      • _malloc.LIBCMT ref: 004529D6
                                      • __fread_nolock.LIBCMT ref: 004529E7
                                      • _free.LIBCMT ref: 00452A17
                                      • _free.LIBCMT ref: 00452A20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                      • String ID:
                                      • API String ID: 1255752989-0
                                      • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                      • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                      • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                      • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __fread_nolock$_fseek_wcscpy
                                      • String ID: FILE
                                      • API String ID: 3888824918-3121273764
                                      • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                      • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                      • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                      • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                      • RegisterClassExW.USER32(00000030), ref: 004104ED
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                      • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                      • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                      • ImageList_ReplaceIcon.COMCTL32(00A1EB30,000000FF,00000000), ref: 00410552
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                      • API String ID: 2914291525-1005189915
                                      • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                      • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                      • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                      • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                      • LoadIconW.USER32(?,00000063), ref: 004103C0
                                      • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                      • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                      • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                      • RegisterClassExW.USER32(?), ref: 0041045D
                                        • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                        • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                        • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                        • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                        • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                        • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                        • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00A1EB30,000000FF,00000000), ref: 00410552
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                      • String ID: #$0$AutoIt v3
                                      • API String ID: 423443420-4155596026
                                      • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                      • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                      • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                      • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _malloc
                                      • String ID: Default
                                      • API String ID: 1579825452-753088835
                                      • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                      • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                      • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                      • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1974 40f679-40f67c 1969->1974 1972 40f640 1970->1972 1973 40f642-40f650 1972->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1969 1977->1972 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1978 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1973 1990 425d11 1988->1990 1989->1975 1990->1985 1991->1968
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __fread_nolock_fseek_memmove_strcat
                                      • String ID: AU3!$EA06
                                      • API String ID: 1268643489-2658333250
                                      • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                      • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                      • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                      • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2003 40112c-401141 DefWindowProcW 1997->2003 2001 401184-40118e call 401250 1998->2001 2002 40114c-40114f 1998->2002 1999->1998 2000 401120-401126 1999->2000 2000->2003 2004 42b038-42b03f 2000->2004 2011 401193-40119a 2001->2011 2005 401151-401157 2002->2005 2006 40119d 2002->2006 2004->2003 2010 42b045-42b059 call 401000 call 40e0c0 2004->2010 2008 401219-40121f 2005->2008 2009 40115d 2005->2009 2012 4011a3-4011a9 2006->2012 2013 42afb4-42afc5 call 40f190 2006->2013 2008->2000 2017 401225-42b06d call 468b0e 2008->2017 2015 401163-401166 2009->2015 2016 42b01d-42b024 2009->2016 2010->2003 2012->2000 2014 4011af 2012->2014 2013->2011 2014->2000 2020 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2014->2020 2021 4011db-401202 SetTimer RegisterWindowMessageW 2014->2021 2023 42afe9-42b018 call 40f190 call 401a50 2015->2023 2024 40116c-401172 2015->2024 2016->2003 2022 42b02a-42b033 call 4370f4 2016->2022 2017->2011 2021->2011 2030 401204-401216 CreatePopupMenu 2021->2030 2022->2003 2023->2003 2024->2000 2032 401174-42afde call 45fd57 2024->2032 2032->2003 2045 42afe4 2032->2045 2045->2011
                                      APIs
                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                      • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                      • PostQuitMessage.USER32(00000000), ref: 004011CB
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                      • CreatePopupMenu.USER32 ref: 00401204
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                      • String ID: TaskbarCreated
                                      • API String ID: 129472671-2362178303
                                      • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                      • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                      • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                      • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                      APIs
                                      • _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                      • std::exception::exception.LIBCMT ref: 00411626
                                      • std::exception::exception.LIBCMT ref: 00411640
                                      • __CxxThrowException@8.LIBCMT ref: 00411651
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                      • String ID: ,*H$4*H$@fI
                                      • API String ID: 615853336-1459471987
                                      • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                      • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                      • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                      • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2065 427b928-427b97a call 427b828 CreateFileW 2068 427b983-427b990 2065->2068 2069 427b97c-427b97e 2065->2069 2072 427b9a3-427b9ba VirtualAlloc 2068->2072 2073 427b992-427b99e 2068->2073 2070 427badc-427bae0 2069->2070 2074 427b9c3-427b9e9 CreateFileW 2072->2074 2075 427b9bc-427b9be 2072->2075 2073->2070 2077 427ba0d-427ba27 ReadFile 2074->2077 2078 427b9eb-427ba08 2074->2078 2075->2070 2079 427ba4b-427ba4f 2077->2079 2080 427ba29-427ba46 2077->2080 2078->2070 2081 427ba51-427ba6e 2079->2081 2082 427ba70-427ba87 WriteFile 2079->2082 2080->2070 2081->2070 2084 427bab2-427bad7 CloseHandle VirtualFree 2082->2084 2085 427ba89-427bab0 2082->2085 2084->2070 2085->2070
                                      APIs
                                      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0427B96D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                      • Instruction ID: 81c31006fbc5ec36616a0c844335cfa0a2179775e2db528847119da5698036ab
                                      • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                      • Instruction Fuzzy Hash: F4510975B60209FBEF20DFA0CC49FDE7B78AF48704F108514F61AEA180DA74AA44DB64

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2095 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2098 427190-4271ae RegQueryValueExW 2095->2098 2099 40e4eb-40e4f0 2095->2099 2100 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2098->2100 2101 42721a-42722a RegCloseKey 2098->2101 2106 427210-427219 call 436508 2100->2106 2107 4271f7-42720e call 402160 2100->2107 2106->2101 2107->2106
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                      • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: QueryValue$CloseOpen
                                      • String ID: Include$Software\AutoIt v3\AutoIt
                                      • API String ID: 1586453840-614718249
                                      • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                      • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                      • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                      • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2112 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                      APIs
                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                      • ShowWindow.USER32(?,00000000), ref: 004105E4
                                      • ShowWindow.USER32(?,00000000), ref: 004105EE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$CreateShow
                                      • String ID: AutoIt v3$edit
                                      • API String ID: 1584632944-3779509399
                                      • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                      • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                      • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                      • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2113 40f250-40f26f RegOpenKeyExW 2114 425e17-425e1c 2113->2114 2115 40f275-40f296 RegQueryValueExW 2113->2115 2116 40f2c3-40f2d6 RegCloseKey 2115->2116 2117 40f298-40f2a3 2115->2117 2118 40f2a9-40f2c2 RegCloseKey 2117->2118 2119 425e1d-425e1f 2117->2119
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                      • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                      • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                      • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Close$OpenQueryValue
                                      • String ID: Control Panel\Mouse
                                      • API String ID: 1607946009-824357125
                                      • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                      • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                      • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                      • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                      APIs
                                      • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                      • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                      • _wcsncpy.LIBCMT ref: 004102ED
                                      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                      • _wcsncpy.LIBCMT ref: 00410340
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                      • String ID:
                                      • API String ID: 3170942423-0
                                      • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                      • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                      • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                      • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                      APIs
                                        • Part of subcall function 0427D328: Sleep.KERNELBASE(000001F4), ref: 0427D339
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0427D540
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateFileSleep
                                      • String ID: AU8Z2Q3RJCPC
                                      • API String ID: 2694422964-349101223
                                      • Opcode ID: dc1694d467049594216286077918d3cdaa56118b9c62c9cc106cfebac48882e9
                                      • Instruction ID: 22f01a7ac2127d1afcfcdc593706f361357a065e6bff104d806365acdbe40f59
                                      • Opcode Fuzzy Hash: dc1694d467049594216286077918d3cdaa56118b9c62c9cc106cfebac48882e9
                                      • Instruction Fuzzy Hash: 88518331E24249DBEF10DBB4C855BEFBB75AF45304F004198E608BB2C0DAB95B45CBA5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: Error:
                                      • API String ID: 4104443479-232661952
                                      • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                      • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                      • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                      • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                      APIs
                                      • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                        • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                        • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                        • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                        • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                      • String ID: X$pWH
                                      • API String ID: 85490731-941433119
                                      • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                      • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                      • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                      • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0427C04D
                                      • ExitProcess.KERNEL32(00000000), ref: 0427C06C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$CreateExit
                                      • String ID: D
                                      • API String ID: 126409537-2746444292
                                      • Opcode ID: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                                      • Instruction ID: 081da0465cdc0c133cdc4e608b61d38f5e282259068d19c55c5a752acf455326
                                      • Opcode Fuzzy Hash: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                                      • Instruction Fuzzy Hash: 8CF0FF75A5024CABDB60EFE0CC49FEE777CBF04B01F408508FB0ADA184DA74A6088B61
                                      APIs
                                      • _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • _memmove.LIBCMT ref: 00401B57
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                      • String ID: @EXITCODE
                                      • API String ID: 2734553683-3436989551
                                      • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                      • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                      • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                      • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                      • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                      • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                      • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                      • String ID:
                                      • API String ID: 1794320848-0
                                      • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                      • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                      • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                      • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                      • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$CurrentTerminate
                                      • String ID:
                                      • API String ID: 2429186680-0
                                      • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                      • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                      • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                      • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                      APIs
                                      • _malloc.LIBCMT ref: 0043214B
                                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                      • _malloc.LIBCMT ref: 0043215D
                                      • _malloc.LIBCMT ref: 0043216F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _malloc$AllocateHeap
                                      • String ID:
                                      • API String ID: 680241177-0
                                      • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                      • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                      • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                      • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                      APIs
                                        • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                      • _free.LIBCMT ref: 004295A0
                                        • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                        • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                        • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                        • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                        • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                        • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                      • String ID: >>>AUTOIT SCRIPT<<<
                                      • API String ID: 3938964917-2806939583
                                      • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                      • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                      • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                      • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                      Strings
                                      • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _strcat
                                      • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                      • API String ID: 1765576173-2684727018
                                      • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                      • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                      • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                      • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ClearVariant
                                      • String ID:
                                      • API String ID: 1473721057-0
                                      • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                      • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                      • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                      • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                      APIs
                                      • __wsplitpath.LIBCMT ref: 004678F7
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLast__wsplitpath_malloc
                                      • String ID:
                                      • API String ID: 4163294574-0
                                      • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                      • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                      • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                      • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                      APIs
                                        • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                      • _strcat.LIBCMT ref: 0040F786
                                        • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                        • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                      • String ID:
                                      • API String ID: 3199840319-0
                                      • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                      • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                      • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                      • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                      APIs
                                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                      • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FreeInfoLibraryParametersSystem
                                      • String ID:
                                      • API String ID: 3403648963-0
                                      • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                      • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                      • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                      • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                      APIs
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                      • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                      • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                      • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                      APIs
                                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                      • __lock_file.LIBCMT ref: 00414A8D
                                        • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                      • __fclose_nolock.LIBCMT ref: 00414A98
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                      • String ID:
                                      • API String ID: 2800547568-0
                                      • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                      • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                      • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                      • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                      APIs
                                      • __lock_file.LIBCMT ref: 00415012
                                      • __ftell_nolock.LIBCMT ref: 0041501F
                                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __ftell_nolock__getptd_noexit__lock_file
                                      • String ID:
                                      • API String ID: 2999321469-0
                                      • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                      • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                      • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                      • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                      APIs
                                        • Part of subcall function 0427B8E8: GetFileAttributesW.KERNELBASE(?), ref: 0427B8F3
                                      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 0427C22E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AttributesCreateDirectoryFile
                                      • String ID:
                                      • API String ID: 3401506121-0
                                      • Opcode ID: 6895c9bceb332db9cceb425be6fea2ac6f2885683c323fbb29a0a11a801850e9
                                      • Instruction ID: 73168d3c7baa967c08ec586730f9063817de10bd4b5bdb49e14e6117acc45cc2
                                      • Opcode Fuzzy Hash: 6895c9bceb332db9cceb425be6fea2ac6f2885683c323fbb29a0a11a801850e9
                                      • Instruction Fuzzy Hash: 0B71A831A20609D7EF14DFF0D844BEFB336EF58704F005469A509E7290EB7A9A45C769
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID:
                                      • API String ID: 4104443479-0
                                      • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                      • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                      • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                      • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID:
                                      • API String ID: 4104443479-0
                                      • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                      • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                      • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                      • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                      • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                      • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                      • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                      • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                      • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                      • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __lock_file
                                      • String ID:
                                      • API String ID: 3031932315-0
                                      • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                      • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                      • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                      • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                      APIs
                                      • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                      • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                      • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                      • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?), ref: 0427B8F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                      • Instruction ID: 8dcd7bfa5009d77f49c7e33c483deccc181453fb1e0f1c68e4d3e2cffd2a9be7
                                      • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                      • Instruction Fuzzy Hash: BEE0863172510DDBCB10CAA889046AD77A4A708314F004655A425C3282E530BA00FE58
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?), ref: 0427B8C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                      • Instruction ID: bf890423dd9458d05b79c54009fc02c0dc04832af901161ae52dd59868971fee
                                      • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                      • Instruction Fuzzy Hash: A2D05E30A1520CABCB10CEA5D908A9A77A8DB09325F008755E91583280D535A9009750
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wfsopen
                                      • String ID:
                                      • API String ID: 197181222-0
                                      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                      • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                      • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                      APIs
                                      • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                      • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                      • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                      • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                      APIs
                                      • Sleep.KERNELBASE(000001F4), ref: 0427D339
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                      • Instruction ID: b931470816c90dda97cdef40f0477f235576e0d6fdc88dc5a996f424e53d3056
                                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                      • Instruction Fuzzy Hash: 57E09A7594010DAFDB00DFA4D54969D7BB4EF04301F1005A1FD0596680DA309A548A62
                                      APIs
                                      • Sleep.KERNELBASE(000001F4), ref: 0427D339
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction ID: 7ced3a172bfa02d1f8dea9d50733ee4cf9ed94276a31033912bcd6cfd3de069e
                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction Fuzzy Hash: C7E0E67594010DDFDB00DFB4D54969D7BB4EF04301F100561FD01D2280D6309D50CA62
                                      APIs
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                      • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                      • GetKeyState.USER32(00000011), ref: 0047C92D
                                      • GetKeyState.USER32(00000009), ref: 0047C936
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                      • GetKeyState.USER32(00000010), ref: 0047C953
                                      • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                      • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                      • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                      • _wcsncpy.LIBCMT ref: 0047CA29
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                      • SendMessageW.USER32 ref: 0047CA7F
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                      • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                      • ImageList_SetDragCursorImage.COMCTL32(00A1EB30,00000000,00000000,00000000), ref: 0047CB9B
                                      • ImageList_BeginDrag.COMCTL32(00A1EB30,00000000,000000F8,000000F0), ref: 0047CBAC
                                      • SetCapture.USER32(?), ref: 0047CBB6
                                      • ClientToScreen.USER32(?,?), ref: 0047CC17
                                      • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                      • ReleaseCapture.USER32 ref: 0047CC3A
                                      • GetCursorPos.USER32(?), ref: 0047CC72
                                      • ScreenToClient.USER32(?,?), ref: 0047CC80
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                      • SendMessageW.USER32 ref: 0047CD12
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                      • SendMessageW.USER32 ref: 0047CD80
                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                      • GetCursorPos.USER32(?), ref: 0047CDC8
                                      • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                      • GetParent.USER32(00000000), ref: 0047CDF7
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                      • SendMessageW.USER32 ref: 0047CE93
                                      • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,02FB1AC8,00000000,?,?,?,?), ref: 0047CF1C
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                      • SendMessageW.USER32 ref: 0047CF6B
                                      • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,02FB1AC8,00000000,?,?,?,?), ref: 0047CFE6
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                      • String ID: @GUI_DRAGID$F
                                      • API String ID: 3100379633-4164748364
                                      • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                      • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                      • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                      • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                      APIs
                                      • GetForegroundWindow.USER32 ref: 00434420
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                      • IsIconic.USER32(?), ref: 0043444F
                                      • ShowWindow.USER32(?,00000009), ref: 0043445C
                                      • SetForegroundWindow.USER32(?), ref: 0043446A
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                      • GetCurrentThreadId.KERNEL32 ref: 00434485
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                      • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                      • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                      • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                      • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                      • keybd_event.USER32(00000012,00000000), ref: 00434514
                                      • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                      • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 2889586943-2988720461
                                      • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                      • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                      • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                      • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                      APIs
                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                      • CloseHandle.KERNEL32(?), ref: 004463A0
                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                      • GetProcessWindowStation.USER32 ref: 004463D1
                                      • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                      • _wcslen.LIBCMT ref: 00446498
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • _wcsncpy.LIBCMT ref: 004464C0
                                      • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                      • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                      • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                      • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                      • CloseWindowStation.USER32(00000000), ref: 0044656C
                                      • CloseDesktop.USER32(?), ref: 0044657A
                                      • SetProcessWindowStation.USER32(?), ref: 00446588
                                      • CloseHandle.KERNEL32(?), ref: 00446592
                                      • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                      • String ID: $@OH$default$winsta0
                                      • API String ID: 3324942560-3791954436
                                      • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                      • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                      • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                      • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                      APIs
                                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                        • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                      • _wcscat.LIBCMT ref: 0044BD94
                                      • _wcscat.LIBCMT ref: 0044BDBD
                                      • __wsplitpath.LIBCMT ref: 0044BDEA
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                      • _wcscpy.LIBCMT ref: 0044BE71
                                      • _wcscat.LIBCMT ref: 0044BE83
                                      • _wcscat.LIBCMT ref: 0044BE95
                                      • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                      • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                      • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                      • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                      • FindClose.KERNEL32(00000000), ref: 0044BF33
                                      • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                      • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                      • String ID: \*.*
                                      • API String ID: 2188072990-1173974218
                                      • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                      • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                      • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                      • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                      • FindClose.KERNEL32(00000000), ref: 00478924
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                      • __swprintf.LIBCMT ref: 004789D3
                                      • __swprintf.LIBCMT ref: 00478A1D
                                      • __swprintf.LIBCMT ref: 00478A4B
                                      • __swprintf.LIBCMT ref: 00478A79
                                        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                      • __swprintf.LIBCMT ref: 00478AA7
                                      • __swprintf.LIBCMT ref: 00478AD5
                                      • __swprintf.LIBCMT ref: 00478B03
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                      • API String ID: 999945258-2428617273
                                      • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                      • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                      • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                      • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                      • __wsplitpath.LIBCMT ref: 00403492
                                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                      • _wcscpy.LIBCMT ref: 004034A7
                                      • _wcscat.LIBCMT ref: 004034BC
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                      • _wcscpy.LIBCMT ref: 004035A0
                                      • _wcslen.LIBCMT ref: 00403623
                                      • _wcslen.LIBCMT ref: 0040367D
                                      Strings
                                      • _, xrefs: 0040371C
                                      • Error opening the file, xrefs: 00428231
                                      • Unterminated string, xrefs: 00428348
                                      • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                      • API String ID: 3393021363-188983378
                                      • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                      • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                      • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                      • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                      • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                      • FindClose.KERNEL32(00000000), ref: 00431B20
                                      • FindClose.KERNEL32(00000000), ref: 00431B34
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                      • FindClose.KERNEL32(00000000), ref: 00431BCD
                                      • FindClose.KERNEL32(00000000), ref: 00431BDB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                      • String ID: *.*
                                      • API String ID: 1409584000-438819550
                                      • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                      • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                      • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                      • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                      APIs
                                      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                      • __swprintf.LIBCMT ref: 00431C2E
                                      • _wcslen.LIBCMT ref: 00431C3A
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                      • String ID: :$\$\??\%s
                                      • API String ID: 2192556992-3457252023
                                      • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                      • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                      • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                      • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 004722A2
                                      • __swprintf.LIBCMT ref: 004722B9
                                      • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                      • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                      • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                      • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                      • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                      • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                      • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                      • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                      • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FolderPath$LocalTime__swprintf
                                      • String ID: %.3d
                                      • API String ID: 3337348382-986655627
                                      • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                      • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                      • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                      • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                      • FindClose.KERNEL32(00000000), ref: 0044291C
                                      • FindClose.KERNEL32(00000000), ref: 00442930
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                      • FindClose.KERNEL32(00000000), ref: 004429D4
                                        • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                      • FindClose.KERNEL32(00000000), ref: 004429E2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                      • String ID: *.*
                                      • API String ID: 2640511053-438819550
                                      • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                      • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                      • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                      • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                      • GetLastError.KERNEL32 ref: 00433414
                                      • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                      • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                      • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                      • String ID: SeShutdownPrivilege
                                      • API String ID: 2938487562-3733053543
                                      • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                      • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                      • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                      • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                      APIs
                                        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                        • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                        • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                      • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                      • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                      • GetLengthSid.ADVAPI32(?), ref: 00446241
                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                      • CopySid.ADVAPI32(00000000), ref: 00446271
                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                      • String ID:
                                      • API String ID: 1255039815-0
                                      • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                      • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                      • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                      • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                      APIs
                                      • __swprintf.LIBCMT ref: 00433073
                                      • __swprintf.LIBCMT ref: 00433085
                                      • __wcsicoll.LIBCMT ref: 00433092
                                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                      • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                      • LockResource.KERNEL32(00000000), ref: 004330CA
                                      • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                      • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                      • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                      • LockResource.KERNEL32(?), ref: 00433120
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                      • String ID:
                                      • API String ID: 1158019794-0
                                      • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                      • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                      • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                      • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                      • String ID:
                                      • API String ID: 1737998785-0
                                      • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                      • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                      • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                      • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                      • GetLastError.KERNEL32 ref: 0045D6BF
                                      • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Error$Mode$DiskFreeLastSpace
                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                      • API String ID: 4194297153-14809454
                                      • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                      • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                      • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                      • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove$_strncmp
                                      • String ID: @oH$\$^$h
                                      • API String ID: 2175499884-3701065813
                                      • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                      • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
                                      • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                      • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
                                      APIs
                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                      • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                      • closesocket.WSOCK32(00000000), ref: 00465377
                                      • listen.WSOCK32(00000000,00000005), ref: 00465381
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                      • closesocket.WSOCK32(00000000), ref: 004653BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                      • String ID:
                                      • API String ID: 540024437-0
                                      • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                      • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                      • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                      • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                      • API String ID: 0-2872873767
                                      • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                      • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                      • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                      • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                      • __wsplitpath.LIBCMT ref: 00475644
                                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                      • _wcscat.LIBCMT ref: 00475657
                                      • __wcsicoll.LIBCMT ref: 0047567B
                                      • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                      • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                      • String ID:
                                      • API String ID: 2547909840-0
                                      • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                      • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                      • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                      • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                      • Sleep.KERNEL32(0000000A), ref: 0045250B
                                      • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                      • FindClose.KERNEL32(?), ref: 004525FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                      • String ID: *.*$\VH
                                      • API String ID: 2786137511-2657498754
                                      • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                      • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                      • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                      • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                      • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                      • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID: pqI
                                      • API String ID: 2579439406-2459173057
                                      • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                      • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                      • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                      • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                      APIs
                                      • __wcsicoll.LIBCMT ref: 00433349
                                      • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                      • __wcsicoll.LIBCMT ref: 00433375
                                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicollmouse_event
                                      • String ID: DOWN
                                      • API String ID: 1033544147-711622031
                                      • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                      • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                      • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                      • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 0044C3D2
                                      • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                      • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                      • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                      • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: KeyboardMessagePostState$InputSend
                                      • String ID:
                                      • API String ID: 3031425849-0
                                      • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                      • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                      • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                      • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                      APIs
                                        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLastinet_addrsocket
                                      • String ID:
                                      • API String ID: 4170576061-0
                                      • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                      • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                      • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                      • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                      APIs
                                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                      • IsWindowVisible.USER32 ref: 0047A368
                                      • IsWindowEnabled.USER32 ref: 0047A378
                                      • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                      • IsIconic.USER32 ref: 0047A393
                                      • IsZoomed.USER32 ref: 0047A3A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                      • String ID:
                                      • API String ID: 292994002-0
                                      • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                      • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                      • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                      • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                      APIs
                                        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                      • CoInitialize.OLE32(00000000), ref: 00478442
                                      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                      • CoUninitialize.OLE32 ref: 0047863C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 886957087-24824748
                                      • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                      • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                      • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                      • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                      APIs
                                      • OpenClipboard.USER32(?), ref: 0046DCE7
                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                      • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                      • CloseClipboard.USER32 ref: 0046DD0D
                                      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                      • CloseClipboard.USER32 ref: 0046DD41
                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                      • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                      • CloseClipboard.USER32 ref: 0046DD99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                      • String ID:
                                      • API String ID: 15083398-0
                                      • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                      • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                      • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                      • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: U$\
                                      • API String ID: 4104443479-100911408
                                      • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                      • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                      • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                      • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstNext
                                      • String ID:
                                      • API String ID: 3541575487-0
                                      • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                      • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                      • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                      • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                      APIs
                                      • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                      • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                      • FindClose.KERNEL32(00000000), ref: 004339EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FileFind$AttributesCloseFirst
                                      • String ID:
                                      • API String ID: 48322524-0
                                      • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                      • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                      • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                      • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                      APIs
                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                      • String ID:
                                      • API String ID: 901099227-0
                                      • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                      • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                      • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                      • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                      APIs
                                      • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Proc
                                      • String ID:
                                      • API String ID: 2346855178-0
                                      • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                      • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                      • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                      • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                      APIs
                                      • BlockInput.USER32(00000001), ref: 0045A38B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: BlockInput
                                      • String ID:
                                      • API String ID: 3456056419-0
                                      • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                      • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                      • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                      • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                      APIs
                                      • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: LogonUser
                                      • String ID:
                                      • API String ID: 1244722697-0
                                      • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                      • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                      • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                      • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                      APIs
                                      • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: NameUser
                                      • String ID:
                                      • API String ID: 2645101109-0
                                      • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                      • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                      • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                      • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                      • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                      • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                      • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: N@
                                      • API String ID: 0-1509896676
                                      • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                      • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                      • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                      • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                      • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                      • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                      • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                      • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                      • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                      • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                      • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                      • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                      • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                      • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                      • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                      • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction ID: f60424c5eb7a9da42ebbc858d91cdaf13705b296a256599516b05a4ffe6585d2
                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction Fuzzy Hash: 0841B371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction ID: d758183891691443d3e9d2b33d24a0fc058afc1a468de03704148df7451fcdf1
                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction Fuzzy Hash: 6A018C78A10209EFCB58DF98C5909AEF7B6FB48250F2085D9E819A7301E730AE41DB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction ID: 32b20c2b5118106ca088689253eaa11a701b09c34b1745f2dae54ecbad0710f2
                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction Fuzzy Hash: ED019278A10109EFCB44DF98C5909AEF7B5FB48310F2085D9D819A7341E730AE41DB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2105979520.000000000427B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0427B000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_427b000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                      APIs
                                      • DeleteObject.GDI32(?), ref: 0045953B
                                      • DeleteObject.GDI32(?), ref: 00459551
                                      • DestroyWindow.USER32(?), ref: 00459563
                                      • GetDesktopWindow.USER32 ref: 00459581
                                      • GetWindowRect.USER32(00000000), ref: 00459588
                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                      • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                      • GetClientRect.USER32(00000000,?), ref: 004596F8
                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                      • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                      • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                      • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                      • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                      • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                      • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                      • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                      • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                      • ShowWindow.USER32(?,00000004), ref: 00459865
                                      • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                      • GetStockObject.GDI32(00000011), ref: 004598CD
                                      • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                      • DeleteDC.GDI32(00000000), ref: 004598F8
                                      • _wcslen.LIBCMT ref: 00459916
                                      • _wcscpy.LIBCMT ref: 0045993A
                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                      • GetDC.USER32(00000000), ref: 004599FC
                                      • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                      • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                      • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                      • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                      • String ID: $AutoIt v3$DISPLAY$static
                                      • API String ID: 4040870279-2373415609
                                      • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                      • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                      • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                      • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                      APIs
                                      • GetSysColor.USER32(00000012), ref: 0044181E
                                      • SetTextColor.GDI32(?,?), ref: 00441826
                                      • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                      • GetSysColor.USER32(0000000F), ref: 00441849
                                      • SetBkColor.GDI32(?,?), ref: 00441864
                                      • SelectObject.GDI32(?,?), ref: 00441874
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                      • GetSysColor.USER32(00000010), ref: 004418B2
                                      • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                      • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                      • DeleteObject.GDI32(?), ref: 004418D5
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                      • FillRect.USER32(?,?,?), ref: 00441970
                                        • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                        • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                        • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                        • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                        • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                        • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                        • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                        • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                        • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                        • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                        • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                        • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                        • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                      • String ID:
                                      • API String ID: 69173610-0
                                      • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                      • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                      • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                      • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                      APIs
                                      • DestroyWindow.USER32(?), ref: 004590F2
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                      • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                      • GetClientRect.USER32(00000000,?), ref: 0045924E
                                      • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                      • GetStockObject.GDI32(00000011), ref: 004592AC
                                      • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                      • DeleteDC.GDI32(00000000), ref: 004592D6
                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                      • GetStockObject.GDI32(00000011), ref: 004593D3
                                      • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                      • API String ID: 2910397461-517079104
                                      • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                      • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                      • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                      • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsnicmp
                                      • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                      • API String ID: 1038674560-3360698832
                                      • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                      • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                      • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                      • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                      APIs
                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                      • SetCursor.USER32(00000000), ref: 0043075B
                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                      • SetCursor.USER32(00000000), ref: 00430773
                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                      • SetCursor.USER32(00000000), ref: 0043078B
                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                      • SetCursor.USER32(00000000), ref: 004307A3
                                      • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                      • SetCursor.USER32(00000000), ref: 004307BB
                                      • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                      • SetCursor.USER32(00000000), ref: 004307D3
                                      • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                      • SetCursor.USER32(00000000), ref: 004307EB
                                      • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                      • SetCursor.USER32(00000000), ref: 00430803
                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                      • SetCursor.USER32(00000000), ref: 0043081B
                                      • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                      • SetCursor.USER32(00000000), ref: 00430833
                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                      • SetCursor.USER32(00000000), ref: 0043084B
                                      • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                      • SetCursor.USER32(00000000), ref: 00430863
                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                      • SetCursor.USER32(00000000), ref: 0043087B
                                      • SetCursor.USER32(00000000), ref: 00430887
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                      • SetCursor.USER32(00000000), ref: 0043089F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Cursor$Load
                                      • String ID:
                                      • API String ID: 1675784387-0
                                      • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                      • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                      • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                      • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                      APIs
                                      • GetSysColor.USER32(0000000E), ref: 00430913
                                      • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                      • GetSysColor.USER32(00000012), ref: 00430933
                                      • SetTextColor.GDI32(?,?), ref: 0043093B
                                      • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                      • GetSysColor.USER32(0000000F), ref: 00430959
                                      • CreateSolidBrush.GDI32(?), ref: 00430962
                                      • GetSysColor.USER32(00000011), ref: 00430979
                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                      • SelectObject.GDI32(?,00000000), ref: 0043099C
                                      • SetBkColor.GDI32(?,?), ref: 004309A6
                                      • SelectObject.GDI32(?,?), ref: 004309B4
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                      • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                      • DrawFocusRect.USER32(?,?), ref: 00430A91
                                      • GetSysColor.USER32(00000011), ref: 00430A9F
                                      • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                      • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                      • SelectObject.GDI32(?,?), ref: 00430AD0
                                      • DeleteObject.GDI32(00000105), ref: 00430ADC
                                      • SelectObject.GDI32(?,?), ref: 00430AE3
                                      • DeleteObject.GDI32(?), ref: 00430AE9
                                      • SetTextColor.GDI32(?,?), ref: 00430AF0
                                      • SetBkColor.GDI32(?,?), ref: 00430AFB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                      • String ID:
                                      • API String ID: 1582027408-0
                                      • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                      • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                      • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                      • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                      APIs
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                      • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseConnectCreateRegistry
                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                      • API String ID: 3217815495-966354055
                                      • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                      • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                      • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                      • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 004566AE
                                      • GetDesktopWindow.USER32 ref: 004566C3
                                      • GetWindowRect.USER32(00000000), ref: 004566CA
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                      • DestroyWindow.USER32(?), ref: 00456746
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                      • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                      • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                      • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                      • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                      • IsWindowVisible.USER32(?), ref: 0045682C
                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                      • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                      • GetWindowRect.USER32(?,?), ref: 00456873
                                      • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                      • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                      • CopyRect.USER32(?,?), ref: 004568BE
                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                      • String ID: ($,$tooltips_class32
                                      • API String ID: 225202481-3320066284
                                      • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                      • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                      • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                      • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                      APIs
                                      • OpenClipboard.USER32(?), ref: 0046DCE7
                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                      • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                      • CloseClipboard.USER32 ref: 0046DD0D
                                      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                      • CloseClipboard.USER32 ref: 0046DD41
                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                      • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                      • CloseClipboard.USER32 ref: 0046DD99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                      • String ID:
                                      • API String ID: 15083398-0
                                      • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                      • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                      • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                      • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • GetWindowRect.USER32(?,?), ref: 00471CF7
                                      • GetClientRect.USER32(?,?), ref: 00471D05
                                      • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                      • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                      • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                      • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                      • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                      • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                      • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                      • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                      • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                      • GetClientRect.USER32(?,?), ref: 00471E8A
                                      • GetStockObject.GDI32(00000011), ref: 00471EA6
                                      • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                      • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                      • String ID: @$AutoIt v3 GUI
                                      • API String ID: 867697134-3359773793
                                      • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                      • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                      • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                      • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                      • API String ID: 1503153545-1459072770
                                      • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                      • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                      • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                      • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll$__wcsnicmp
                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                      • API String ID: 790654849-32604322
                                      • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                      • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                      • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                      • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                      • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                      • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                      • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window
                                      • String ID: 0
                                      • API String ID: 2353593579-4108050209
                                      • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                      • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                      • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                      • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                      APIs
                                      • GetSysColor.USER32(0000000F), ref: 0044A05E
                                      • GetClientRect.USER32(?,?), ref: 0044A0D1
                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                      • GetWindowDC.USER32(?), ref: 0044A0F6
                                      • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                      • ReleaseDC.USER32(?,?), ref: 0044A11B
                                      • GetSysColor.USER32(0000000F), ref: 0044A131
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                      • GetSysColor.USER32(0000000F), ref: 0044A14F
                                      • GetSysColor.USER32(00000005), ref: 0044A15B
                                      • GetWindowDC.USER32(?), ref: 0044A1BE
                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                      • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                      • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                      • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                      • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                      • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                      • GetSysColor.USER32(00000008), ref: 0044A265
                                      • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                      • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                      • GetStockObject.GDI32(00000005), ref: 0044A28A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                      • String ID:
                                      • API String ID: 1744303182-0
                                      • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                      • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                      • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                      • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                      APIs
                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                      • __mtterm.LIBCMT ref: 00417C34
                                        • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                        • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                      • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                      • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                      • __init_pointers.LIBCMT ref: 00417CE6
                                      • __calloc_crt.LIBCMT ref: 00417D54
                                      • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                      • API String ID: 4163708885-3819984048
                                      • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                      • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                      • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                      • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: >>>AUTOIT SCRIPT<<<$\
                                      • API String ID: 0-1896584978
                                      • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                      • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                      • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                      • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                      APIs
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,?), ref: 0046EE79
                                      • GetForegroundWindow.USER32(?,?,?,?,?,?), ref: 0046F265
                                      • IsWindow.USER32(?), ref: 0046F29A
                                      • GetDesktopWindow.USER32 ref: 0046F356
                                      • EnumChildWindows.USER32(00000000), ref: 0046F35D
                                      • EnumWindows.USER32(0046130D,?), ref: 0046F365
                                        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
                                      • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                      • API String ID: 329138477-1919597938
                                      • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
                                      • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
                                      • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
                                      • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll$IconLoad
                                      • String ID: blank$info$question$stop$warning
                                      • API String ID: 2485277191-404129466
                                      • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                      • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                      • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                      • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                      APIs
                                      • LoadIconW.USER32(?,00000063), ref: 0045464C
                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                      • SetWindowTextW.USER32(?,?), ref: 00454678
                                      • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                      • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                      • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                      • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                      • GetWindowRect.USER32(?,?), ref: 004546F5
                                      • SetWindowTextW.USER32(?,?), ref: 00454765
                                      • GetDesktopWindow.USER32 ref: 0045476F
                                      • GetWindowRect.USER32(00000000), ref: 00454776
                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                      • GetClientRect.USER32(?,?), ref: 004547D2
                                      • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                      • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                      • String ID:
                                      • API String ID: 3869813825-0
                                      • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                      • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                      • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                      • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                      APIs
                                      • _wcslen.LIBCMT ref: 00464B28
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                      • _wcslen.LIBCMT ref: 00464C28
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                      • _wcslen.LIBCMT ref: 00464CBA
                                      • _wcslen.LIBCMT ref: 00464CD0
                                      • _wcslen.LIBCMT ref: 00464CEF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$Directory$CurrentSystem
                                      • String ID: D
                                      • API String ID: 1914653954-2746444292
                                      • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                      • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                      • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                      • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                      APIs
                                      • _wcsncpy.LIBCMT ref: 0045CE39
                                      • __wsplitpath.LIBCMT ref: 0045CE78
                                      • _wcscat.LIBCMT ref: 0045CE8B
                                      • _wcscat.LIBCMT ref: 0045CE9E
                                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                      • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                      • _wcscpy.LIBCMT ref: 0045CF61
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                      • String ID: *.*
                                      • API String ID: 1153243558-438819550
                                      • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                      • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                      • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                      • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll
                                      • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                      • API String ID: 3832890014-4202584635
                                      • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                      • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                      • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                      • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                      APIs
                                      • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                      • GetFocus.USER32 ref: 0046A0DD
                                      • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessagePost$CtrlFocus
                                      • String ID: 0
                                      • API String ID: 1534620443-4108050209
                                      • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                      • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                      • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                      • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                      APIs
                                      • DestroyWindow.USER32(?), ref: 004558E3
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$CreateDestroy
                                      • String ID: ,$tooltips_class32
                                      • API String ID: 1109047481-3856767331
                                      • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                      • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                      • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                      • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                      • GetMenuItemCount.USER32(?), ref: 00468C45
                                      • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                      • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                      • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                      • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                      • GetMenuItemCount.USER32 ref: 00468CFD
                                      • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                      • GetCursorPos.USER32(?), ref: 00468D3F
                                      • SetForegroundWindow.USER32(?), ref: 00468D49
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                      • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                      • String ID: 0
                                      • API String ID: 1441871840-4108050209
                                      • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                      • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                      • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                      • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                      • __swprintf.LIBCMT ref: 00460915
                                      • __swprintf.LIBCMT ref: 0046092D
                                      • _wprintf.LIBCMT ref: 004609E1
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                      • API String ID: 3631882475-2268648507
                                      • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                      • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                      • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                      • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                      APIs
                                      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                      • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                      • SendMessageW.USER32 ref: 00471740
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                      • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                      • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                      • SendMessageW.USER32 ref: 0047184F
                                      • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                      • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                      • String ID:
                                      • API String ID: 4116747274-0
                                      • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                      • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                      • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                      • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                      • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                      • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: InfoItemMenu$Sleep
                                      • String ID: 0
                                      • API String ID: 1196289194-4108050209
                                      • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                      • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                      • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                      • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                      APIs
                                      • GetDC.USER32(00000000), ref: 0043143E
                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                      • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                      • SelectObject.GDI32(00000000,?), ref: 00431466
                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                      • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                      • String ID: (
                                      • API String ID: 3300687185-3887548279
                                      • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                      • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                      • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                      • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                      APIs
                                        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                      • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                      • API String ID: 1976180769-4113822522
                                      • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                      • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                      • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                      • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                      • String ID:
                                      • API String ID: 461458858-0
                                      • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                      • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                      • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                      • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                      APIs
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                      • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                      • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                      • CloseHandle.KERNEL32(00000000), ref: 00430113
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                      • GlobalFree.KERNEL32(00000000), ref: 00430150
                                      • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                      • DeleteObject.GDI32(?), ref: 004301D0
                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                      • String ID:
                                      • API String ID: 3969911579-0
                                      • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                      • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                      • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                      • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                      • String ID: 0
                                      • API String ID: 956284711-4108050209
                                      • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                      • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                      • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                      • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                      • String ID: 0.0.0.0
                                      • API String ID: 1965227024-3771769585
                                      • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                      • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                      • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                      • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                      APIs
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: SendString$_memmove_wcslen
                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                      • API String ID: 369157077-1007645807
                                      • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                      • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                      • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                      • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                      APIs
                                      • GetParent.USER32 ref: 00445BF8
                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                      • __wcsicoll.LIBCMT ref: 00445C33
                                      • __wcsicoll.LIBCMT ref: 00445C4F
                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll$ClassMessageNameParentSend
                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                      • API String ID: 3125838495-3381328864
                                      • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                      • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                      • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                      • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                      APIs
                                      • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                      • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                      • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                      • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                      • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$CharNext
                                      • String ID:
                                      • API String ID: 1350042424-0
                                      • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                      • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                      • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                      • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                      APIs
                                        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                      • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                      • _wcscpy.LIBCMT ref: 004787E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                      • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                      • API String ID: 3052893215-2127371420
                                      • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                      • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                      • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                      • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                      APIs
                                      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                      • __swprintf.LIBCMT ref: 0045E7F7
                                      • _wprintf.LIBCMT ref: 0045E8B3
                                      • _wprintf.LIBCMT ref: 0045E8D7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 2295938435-2354261254
                                      • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                      • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                      • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                      • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __swprintf_wcscpy$__i64tow__itow
                                      • String ID: %.15g$0x%p$False$True
                                      • API String ID: 3038501623-2263619337
                                      • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                      • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                      • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                      • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                      APIs
                                      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                      • __swprintf.LIBCMT ref: 0045E5F6
                                      • _wprintf.LIBCMT ref: 0045E6A3
                                      • _wprintf.LIBCMT ref: 0045E6C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 2295938435-8599901
                                      • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                      • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                      • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                      • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                      APIs
                                      • timeGetTime.WINMM ref: 00443B67
                                        • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                      • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                      • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                      • SetActiveWindow.USER32(?), ref: 00443BEC
                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                      • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                      • IsWindow.USER32(?), ref: 00443C3A
                                      • EndDialog.USER32(?,00000000), ref: 00443C4C
                                        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                      • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                      • String ID: BUTTON
                                      • API String ID: 1834419854-3405671355
                                      • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                      • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                      • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                      • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                      • LoadStringW.USER32(00000000), ref: 00454040
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • _wprintf.LIBCMT ref: 00454074
                                      • __swprintf.LIBCMT ref: 004540A3
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                      • API String ID: 455036304-4153970271
                                      • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                      • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                      • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                      • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                      APIs
                                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                      • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                      • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                      • _memmove.LIBCMT ref: 00467EB8
                                      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                      • _memmove.LIBCMT ref: 00467F6C
                                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                      • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                      • String ID:
                                      • API String ID: 2170234536-0
                                      • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                      • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                      • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                      • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 00453CE0
                                      • SetKeyboardState.USER32(?), ref: 00453D3B
                                      • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                      • GetKeyState.USER32(000000A0), ref: 00453D75
                                      • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                      • GetKeyState.USER32(000000A1), ref: 00453DB5
                                      • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                      • GetKeyState.USER32(00000011), ref: 00453DEF
                                      • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                      • GetKeyState.USER32(00000012), ref: 00453E26
                                      • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                      • GetKeyState.USER32(0000005B), ref: 00453E5D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: State$Async$Keyboard
                                      • String ID:
                                      • API String ID: 541375521-0
                                      • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                      • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                      • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                      • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                      APIs
                                      • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                      • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                      • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                      • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                      • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                      • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                      • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                      • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                      • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                      • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$ItemMoveRect$Invalidate
                                      • String ID:
                                      • API String ID: 3096461208-0
                                      • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                      • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                      • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                      • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                      APIs
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                      • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                      • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                      • DeleteObject.GDI32(?), ref: 0047151E
                                      • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                      • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                      • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                      • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                      • DeleteObject.GDI32(?), ref: 004715EA
                                      • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                      • String ID:
                                      • API String ID: 3218148540-0
                                      • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                      • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                      • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                      • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                      • String ID:
                                      • API String ID: 136442275-0
                                      • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                      • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                      • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                      • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                      APIs
                                      • _wcsncpy.LIBCMT ref: 00467490
                                      • _wcsncpy.LIBCMT ref: 004674BC
                                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                      • _wcstok.LIBCMT ref: 004674FF
                                        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                      • _wcstok.LIBCMT ref: 004675B2
                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                      • _wcslen.LIBCMT ref: 00467793
                                      • _wcscpy.LIBCMT ref: 00467641
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • _wcslen.LIBCMT ref: 004677BD
                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                      • String ID: X
                                      • API String ID: 3104067586-3081909835
                                      • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                      • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                      • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                      • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                      • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                      • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                      • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                      • _wcslen.LIBCMT ref: 0046CDB0
                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                      • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                      • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                        • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                        • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                        • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                      Strings
                                      • NULL Pointer assignment, xrefs: 0046CEA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                      • String ID: NULL Pointer assignment
                                      • API String ID: 440038798-2785691316
                                      • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                      • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                      • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                      • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                      • _wcslen.LIBCMT ref: 004610A3
                                      • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                      • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                      • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                      • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                      • GetWindowRect.USER32(?,?), ref: 00461248
                                        • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                      • String ID: ThumbnailClass
                                      • API String ID: 4136854206-1241985126
                                      • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                      • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                      • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                      • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                      APIs
                                      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                      • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                      • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                      • GetClientRect.USER32(?,?), ref: 00471A1A
                                      • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                      • DestroyIcon.USER32(?), ref: 00471AF4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                      • String ID: 2
                                      • API String ID: 1331449709-450215437
                                      • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                      • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                      • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                      • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                      • __swprintf.LIBCMT ref: 00460915
                                      • __swprintf.LIBCMT ref: 0046092D
                                      • _wprintf.LIBCMT ref: 004609E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                      • API String ID: 3054410614-2561132961
                                      • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                      • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                      • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                      • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                      APIs
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                      • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                      • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                      • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                      • API String ID: 600699880-22481851
                                      • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                      • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                      • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                      • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DestroyWindow
                                      • String ID: static
                                      • API String ID: 3375834691-2160076837
                                      • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                      • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                      • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                      • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                      • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DriveType
                                      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                      • API String ID: 2907320926-3566645568
                                      • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                      • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                      • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                      • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                      APIs
                                        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                      • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                      • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                      • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                      • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                      • DeleteObject.GDI32(006D0000), ref: 00470A04
                                      • DestroyIcon.USER32(006F0052), ref: 00470A1C
                                      • DeleteObject.GDI32(E85FB16F), ref: 00470A34
                                      • DestroyWindow.USER32(00650076), ref: 00470A4C
                                      • DestroyIcon.USER32(?), ref: 00470A73
                                      • DestroyIcon.USER32(?), ref: 00470A81
                                      • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                      • String ID:
                                      • API String ID: 1237572874-0
                                      • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                      • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                      • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                      • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                      APIs
                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                      • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                      • VariantInit.OLEAUT32(?), ref: 004793E1
                                      • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                      • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                      • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                      • VariantClear.OLEAUT32(?), ref: 00479489
                                      • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                      • VariantClear.OLEAUT32(?), ref: 004794CA
                                      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                      • String ID:
                                      • API String ID: 2706829360-0
                                      • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                      • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                      • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                      • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 0044480E
                                      • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                      • GetKeyState.USER32(000000A0), ref: 004448AA
                                      • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                      • GetKeyState.USER32(000000A1), ref: 004448D9
                                      • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                      • GetKeyState.USER32(00000011), ref: 00444903
                                      • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                      • GetKeyState.USER32(00000012), ref: 0044492D
                                      • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                      • GetKeyState.USER32(0000005B), ref: 00444958
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: State$Async$Keyboard
                                      • String ID:
                                      • API String ID: 541375521-0
                                      • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                      • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                      • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                      • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: InitVariant$_malloc_wcscpy_wcslen
                                      • String ID:
                                      • API String ID: 3413494760-0
                                      • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                      • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                      • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                      • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _strncmp
                                      • String ID: '$DEFINE$\$`$h$h
                                      • API String ID: 909875538-3708680428
                                      • Opcode ID: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
                                      • Instruction ID: 816ce89e9d314c50cae2ff635e2dae77420ade2a81b985ada7b38a9c48760da0
                                      • Opcode Fuzzy Hash: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
                                      • Instruction Fuzzy Hash: C502B470A042498FEF14CF69C9906AEBBF2FF85304F2481AED8459B341D7399946CB55
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressProc_free_malloc$_strcat_strlen
                                      • String ID: AU3_FreeVar
                                      • API String ID: 2634073740-771828931
                                      • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                      • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                      • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                      • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                      APIs
                                      • CoInitialize.OLE32 ref: 0046C63A
                                      • CoUninitialize.OLE32 ref: 0046C645
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                        • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                      • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                      • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                      • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                      • IIDFromString.OLE32(?,?), ref: 0046C705
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                      • API String ID: 2294789929-1287834457
                                      • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                      • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                      • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                      • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                      APIs
                                        • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                        • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                      • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                      • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                      • ImageList_EndDrag.COMCTL32 ref: 00471169
                                      • ReleaseCapture.USER32 ref: 0047116F
                                      • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                      • API String ID: 2483343779-2107944366
                                      • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                      • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                      • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                      • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                      APIs
                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                      • _wcslen.LIBCMT ref: 00450720
                                      • _wcscat.LIBCMT ref: 00450733
                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                      • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window_wcscat_wcslen
                                      • String ID: -----$SysListView32
                                      • API String ID: 4008455318-3975388722
                                      • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                      • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                      • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                      • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                      • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                      • GetParent.USER32 ref: 00469C98
                                      • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                      • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                      • GetParent.USER32 ref: 00469CBC
                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 2360848162-1403004172
                                      • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                      • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                      • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                      • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469E71
                                      • GetDlgCtrlID.USER32(00000000), ref: 00469E82
                                      • GetParent.USER32 ref: 00469E96
                                      • SendMessageW.USER32(00000000,?,00000111), ref: 00469E9D
                                      • GetDlgCtrlID.USER32(00000000), ref: 00469EA3
                                      • GetParent.USER32 ref: 00469EBA
                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469EC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 2360848162-1403004172
                                      • Opcode ID: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
                                      • Instruction ID: 3a0c9dd1fa5fd4c1d1a647422213a645dfa1e4764d365342f395b6f430504e68
                                      • Opcode Fuzzy Hash: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
                                      • Instruction Fuzzy Hash: D121F7716001187BDB00ABA9CC85BBF77ACEB85310F00855FFA44EB2D5D6B8DC4587A5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                      • String ID:
                                      • API String ID: 262282135-0
                                      • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                      • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                      • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                      • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                      APIs
                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                      • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                      • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                      • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                      • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow
                                      • String ID:
                                      • API String ID: 312131281-0
                                      • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                      • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                      • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                      • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                      APIs
                                        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                      • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                      • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                      • String ID:
                                      • API String ID: 3771399671-0
                                      • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                      • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                      • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                      • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 00434643
                                      • GetForegroundWindow.USER32(00000000), ref: 00434655
                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                      • String ID:
                                      • API String ID: 2156557900-0
                                      • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                      • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                      • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                      • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                      • API String ID: 0-1603158881
                                      • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                      • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                      • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                      • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                      APIs
                                      • CreateMenu.USER32 ref: 00448603
                                      • SetMenu.USER32(?,00000000), ref: 00448613
                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                      • IsMenu.USER32(?), ref: 004486AB
                                      • CreatePopupMenu.USER32 ref: 004486B5
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                      • DrawMenuBar.USER32 ref: 004486F5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                      • String ID: 0
                                      • API String ID: 161812096-4108050209
                                      • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                      • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                      • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                      • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                      • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                      • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                      • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                      • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                      • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                      • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                      APIs
                                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                      • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                      • MoveFileW.KERNEL32(?,?), ref: 00453932
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                      • String ID:
                                      • API String ID: 978794511-0
                                      • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                      • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                      • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                      • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                      • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                      • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                      • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ClearVariant
                                      • String ID:
                                      • API String ID: 1473721057-0
                                      • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                      • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                      • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                      • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove$_memcmp
                                      • String ID: '$\$h
                                      • API String ID: 2205784470-1303700344
                                      • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                      • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                      • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                      • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                      APIs
                                      • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                      • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                      • VariantClear.OLEAUT32 ref: 0045EA6D
                                      • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                      • __swprintf.LIBCMT ref: 0045EC33
                                      • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                      Strings
                                      • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                      • String ID: %4d%02d%02d%02d%02d%02d
                                      • API String ID: 2441338619-1568723262
                                      • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                      • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                      • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                      • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                      APIs
                                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                      • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Interlocked$DecrementIncrement$Sleep
                                      • String ID: @COM_EVENTOBJ
                                      • API String ID: 327565842-2228938565
                                      • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                      • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                      • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                      • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                      APIs
                                      • VariantClear.OLEAUT32(?), ref: 0047031B
                                      • VariantClear.OLEAUT32(?), ref: 0047044F
                                      • VariantInit.OLEAUT32(?), ref: 004704A3
                                      • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                      • VariantClear.OLEAUT32(?), ref: 00470516
                                        • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                      • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                        • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                      • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$Clear$Copy$CallDispFuncInit
                                      • String ID: H
                                      • API String ID: 3613100350-2852464175
                                      • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                      • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                      • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                      • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                      APIs
                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                      • DestroyWindow.USER32(?), ref: 00426F50
                                      • UnregisterHotKey.USER32(?), ref: 00426F77
                                      • FreeLibrary.KERNEL32(?), ref: 0042701F
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                      • String ID: close all
                                      • API String ID: 4174999648-3243417748
                                      • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                      • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                      • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                      • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                      • String ID:
                                      • API String ID: 1291720006-3916222277
                                      • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                      • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                      • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                      • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                      • IsMenu.USER32(?), ref: 0045FC5F
                                      • CreatePopupMenu.USER32 ref: 0045FC97
                                      • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                      • String ID: 0$2
                                      • API String ID: 93392585-3793063076
                                      • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                      • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                      • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                      • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                      APIs
                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                      • VariantClear.OLEAUT32(?), ref: 00435320
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                      • VariantClear.OLEAUT32(?), ref: 004353B3
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                      • String ID: crts
                                      • API String ID: 586820018-3724388283
                                      • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                      • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                      • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                      • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                      APIs
                                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                      • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                      • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                      • _wcscat.LIBCMT ref: 0044BCAF
                                      • _wcslen.LIBCMT ref: 0044BCBB
                                      • _wcslen.LIBCMT ref: 0044BCD1
                                      • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                      • String ID: \*.*
                                      • API String ID: 2326526234-1173974218
                                      • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                      • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                      • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                      • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                      APIs
                                        • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                      • _wcslen.LIBCMT ref: 004335F2
                                      • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                      • GetLastError.KERNEL32 ref: 0043362B
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                      • _wcsrchr.LIBCMT ref: 00433666
                                        • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                      • String ID: \
                                      • API String ID: 321622961-2967466578
                                      • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                      • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                      • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                      • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsnicmp
                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                      • API String ID: 1038674560-2734436370
                                      • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                      • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                      • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                      • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                      • LoadStringW.USER32(00000000), ref: 00434060
                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                      • LoadStringW.USER32(00000000), ref: 00434078
                                      • _wprintf.LIBCMT ref: 004340A1
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                      Strings
                                      • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message_wprintf
                                      • String ID: %s (%d) : ==> %s: %s %s
                                      • API String ID: 3648134473-3128320259
                                      • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                      • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                      • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                      • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                      APIs
                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                      • __lock.LIBCMT ref: 00417981
                                        • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                        • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                        • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                      • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                      • __lock.LIBCMT ref: 004179A2
                                      • ___addlocaleref.LIBCMT ref: 004179C0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                      • String ID: KERNEL32.DLL$pI
                                      • API String ID: 637971194-197072765
                                      • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                      • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                      • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                      • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove$_malloc
                                      • String ID:
                                      • API String ID: 1938898002-0
                                      • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                      • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                      • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                      • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                      APIs
                                        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                      • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                      • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                      • String ID:
                                      • API String ID: 3771399671-0
                                      • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                      • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                                      • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                      • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                      • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                      • _memmove.LIBCMT ref: 0044B555
                                      • _memmove.LIBCMT ref: 0044B578
                                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                      • String ID:
                                      • API String ID: 2737351978-0
                                      • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                      • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                      • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                      • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                      APIs
                                      • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                      • __calloc_crt.LIBCMT ref: 00415246
                                      • __getptd.LIBCMT ref: 00415253
                                      • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                      • _free.LIBCMT ref: 0041529E
                                      • __dosmaperr.LIBCMT ref: 004152A9
                                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                      • String ID:
                                      • API String ID: 3638380555-0
                                      • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                      • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                      • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                      • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 0046C96E
                                        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$Copy$ClearErrorInitLast
                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                      • API String ID: 3207048006-625585964
                                      • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                      • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                      • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                      • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                      APIs
                                      • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                      • inet_addr.WSOCK32(?), ref: 0046559B
                                      • gethostbyname.WSOCK32(?), ref: 004655A6
                                      • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                      • _memmove.LIBCMT ref: 004656CA
                                      • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                      • WSACleanup.WSOCK32 ref: 00465762
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                      • String ID:
                                      • API String ID: 2945290962-0
                                      • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                      • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                      • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                      • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                      APIs
                                      • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                      • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                      • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                      • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                      • String ID:
                                      • API String ID: 1457242333-0
                                      • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                      • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                      • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                      • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ConnectRegistry_memmove_wcslen
                                      • String ID:
                                      • API String ID: 15295421-0
                                      • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                      • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                      • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                      • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                      APIs
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • _wcstok.LIBCMT ref: 004675B2
                                        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                      • _wcscpy.LIBCMT ref: 00467641
                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                      • _wcslen.LIBCMT ref: 00467793
                                      • _wcslen.LIBCMT ref: 004677BD
                                        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                      • String ID: X
                                      • API String ID: 780548581-3081909835
                                      • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                      • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                      • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                      • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                      APIs
                                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                      • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                      • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                      • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                      • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                      • CloseFigure.GDI32(?), ref: 0044751F
                                      • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                      • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                      • String ID:
                                      • API String ID: 4082120231-0
                                      • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                      • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                      • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                      • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                      • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                      • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                      • String ID:
                                      • API String ID: 2027346449-0
                                      • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                      • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                      • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                      • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                      • GetMenu.USER32 ref: 0047A703
                                      • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                      • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                      • _wcslen.LIBCMT ref: 0047A79E
                                      • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                      • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                      • String ID:
                                      • API String ID: 3257027151-0
                                      • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                      • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                      • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                      • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                      APIs
                                      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLastselect
                                      • String ID:
                                      • API String ID: 215497628-0
                                      • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                      • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                      • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                      • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                      APIs
                                      • GetParent.USER32(?), ref: 0044443B
                                      • GetKeyboardState.USER32(?), ref: 00444450
                                      • SetKeyboardState.USER32(?), ref: 004444A4
                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                      • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                      • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                      • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                      APIs
                                      • GetParent.USER32(?), ref: 00444633
                                      • GetKeyboardState.USER32(?), ref: 00444648
                                      • SetKeyboardState.USER32(?), ref: 0044469C
                                      • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                      • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                      • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                      • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                      • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                      • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                      • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __snwprintf__wcsicoll_wcscpy
                                      • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                      • API String ID: 1729044348-3025626884
                                      • Opcode ID: 4b9553ffb05bb61a93765f5dfb1e0a66324b60b4a152289245f0c89c86547163
                                      • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
                                      • Opcode Fuzzy Hash: 4b9553ffb05bb61a93765f5dfb1e0a66324b60b4a152289245f0c89c86547163
                                      • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
                                      APIs
                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                      • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                      • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                      • DeleteObject.GDI32(?), ref: 00455736
                                      • DeleteObject.GDI32(?), ref: 00455744
                                      • DestroyIcon.USER32(?), ref: 00455752
                                      • DestroyWindow.USER32(?), ref: 00455760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                      • String ID:
                                      • API String ID: 2354583917-0
                                      • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                      • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                      • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                      • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                      • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                      • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                      • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                      APIs
                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Enable$Show$MessageMoveSend
                                      • String ID:
                                      • API String ID: 896007046-0
                                      • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                      • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                      • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                      • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                      APIs
                                      • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                      • GetFocus.USER32 ref: 00448ACF
                                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Enable$Show$FocusMessageSend
                                      • String ID:
                                      • API String ID: 3429747543-0
                                      • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                      • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                      • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                      • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                      APIs
                                        • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                        • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                        • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                      • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                      • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                      • String ID:
                                      • API String ID: 3300667738-0
                                      • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                      • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                      • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                      • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                      • __swprintf.LIBCMT ref: 0045D4E9
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume__swprintf
                                      • String ID: %lu$\VH
                                      • API String ID: 3164766367-2432546070
                                      • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                      • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                      • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                      • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                      APIs
                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                      • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                      • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: Msctls_Progress32
                                      • API String ID: 3850602802-3636473452
                                      • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                      • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                      • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                      • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                      APIs
                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
                                      • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
                                      • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
                                      • __wsplitpath.LIBCMT ref: 00433E6D
                                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                      • _wcscat.LIBCMT ref: 00433E80
                                      • __wcsicoll.LIBCMT ref: 00433E90
                                      • CloseHandle.KERNEL32(00000000), ref: 00433EC8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$BaseCloseEnumHandleModuleModulesNameOpen__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                      • String ID:
                                      • API String ID: 135935984-0
                                      • Opcode ID: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
                                      • Instruction ID: 66738fc5919b7c3a3c7c4a311c48fd84e22d6c2a66b6279363cc5d51ef299119
                                      • Opcode Fuzzy Hash: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
                                      • Instruction Fuzzy Hash: 832180B6500118AFDB11CF90CD85EEEB379EB8C700F10459AFA0997150DA75AA85CBA4
                                      APIs
                                      • _malloc.LIBCMT ref: 0041F707
                                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                      • _free.LIBCMT ref: 0041F71A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AllocateHeap_free_malloc
                                      • String ID: [B
                                      • API String ID: 1020059152-632041663
                                      • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                      • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                      • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                      • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                      APIs
                                      • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                      • __calloc_crt.LIBCMT ref: 00413DB0
                                      • __getptd.LIBCMT ref: 00413DBD
                                      • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                      • _free.LIBCMT ref: 00413E07
                                      • __dosmaperr.LIBCMT ref: 00413E12
                                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                      • String ID:
                                      • API String ID: 155776804-0
                                      • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                      • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                      • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                      • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                      APIs
                                        • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                        • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                      • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                      • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                      • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                      • String ID:
                                      • API String ID: 1957940570-0
                                      • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                      • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                      • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                      • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                      APIs
                                      • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                      • ExitThread.KERNEL32 ref: 00413D4E
                                      • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                      • __freefls@4.LIBCMT ref: 00413D74
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                      • String ID:
                                      • API String ID: 259663610-0
                                      • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                      • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                      • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                      • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 004302E6
                                      • GetWindowRect.USER32(00000000,?), ref: 00430316
                                      • GetClientRect.USER32(?,?), ref: 00430364
                                      • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                      • GetWindowRect.USER32(?,?), ref: 004303C3
                                      • ScreenToClient.USER32(?,?), ref: 004303EC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Rect$Client$Window$MetricsScreenSystem
                                      • String ID:
                                      • API String ID: 3220332590-0
                                      • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                      • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                      • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                      • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _malloc_wcslen$_strcat_wcscpy
                                      • String ID:
                                      • API String ID: 1612042205-0
                                      • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                      • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                      • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                      • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove_strncmp
                                      • String ID: >$U$\
                                      • API String ID: 2666721431-237099441
                                      • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                      • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                      • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                      • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 0044C570
                                      • SetKeyboardState.USER32(00000080), ref: 0044C594
                                      • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                      • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                      • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                      • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$InputSend
                                      • String ID:
                                      • API String ID: 2221674350-0
                                      • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                      • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                      • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                      • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcscpy$_wcscat
                                      • String ID:
                                      • API String ID: 2037614760-0
                                      • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                      • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                      • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                      • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                      APIs
                                      • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                      • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                      • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                      • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                      • VariantClear.OLEAUT32(?), ref: 00451CA1
                                      • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$Copy$AllocClearErrorLastString
                                      • String ID:
                                      • API String ID: 960795272-0
                                      • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                      • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                      • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                      • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: File$Delete$Copy__fread_nolock
                                      • String ID:
                                      • API String ID: 2446588422-0
                                      • Opcode ID: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                      • Instruction ID: e3b766f0d7570c057f36e817525b07a345c540c94ec9958bdefdc59333e68e6d
                                      • Opcode Fuzzy Hash: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                      • Instruction Fuzzy Hash: D9517CB26083409BC320DF6AD984AAFB7E8FBD9740F10492FF68983201DA75D548CB56
                                      APIs
                                      • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                      • GetWindowRect.USER32(?,?), ref: 00447C5D
                                      • ScreenToClient.USER32(?,?), ref: 00447C7B
                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                      • EndPaint.USER32(?,?), ref: 00447D13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                      • String ID:
                                      • API String ID: 4189319755-0
                                      • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                      • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                      • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                      • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                      APIs
                                      • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                      • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                      • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                      • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow$InvalidateRect
                                      • String ID:
                                      • API String ID: 1976402638-0
                                      • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                      • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                      • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                      • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                      APIs
                                      • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                      • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                      • ShowWindow.USER32(?,00000000), ref: 00440B18
                                      • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                      • EnableWindow.USER32(?,00000001), ref: 00440B50
                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Show$Enable$MessageSend
                                      • String ID:
                                      • API String ID: 642888154-0
                                      • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                      • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                      • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                      • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$Copy$ClearErrorLast
                                      • String ID: NULL Pointer assignment$Not an Object type
                                      • API String ID: 2487901850-572801152
                                      • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                      • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                      • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                      • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                      APIs
                                      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Enable$Show$MessageSend
                                      • String ID:
                                      • API String ID: 1871949834-0
                                      • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                      • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                      • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                      • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                      • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                      • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                      • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                      APIs
                                      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                      • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                      • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                      • SendMessageW.USER32 ref: 00471AE3
                                      • DestroyIcon.USER32(?), ref: 00471AF4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                      • String ID:
                                      • API String ID: 3611059338-0
                                      • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                      • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                      • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                      • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DestroyWindow$DeleteObject$IconMove
                                      • String ID:
                                      • API String ID: 1640429340-0
                                      • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                      • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                      • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                      • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                      APIs
                                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                      • _wcslen.LIBCMT ref: 004438CD
                                      • _wcslen.LIBCMT ref: 004438E6
                                      • _wcstok.LIBCMT ref: 004438F8
                                      • _wcslen.LIBCMT ref: 0044390C
                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                      • _wcstok.LIBCMT ref: 00443931
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                      • String ID:
                                      • API String ID: 3632110297-0
                                      • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                      • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                      • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                      • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$DeleteMenuObject$IconWindow
                                      • String ID:
                                      • API String ID: 752480666-0
                                      • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                      • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                      • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                      • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                      • String ID:
                                      • API String ID: 3275902921-0
                                      • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                      • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                      • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                      • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                      • String ID:
                                      • API String ID: 3275902921-0
                                      • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                      • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                      • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                      • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                      APIs
                                      • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                      • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                      • String ID:
                                      • API String ID: 2833360925-0
                                      • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                      • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                      • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                      • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                      APIs
                                      • SendMessageW.USER32 ref: 004555C7
                                      • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                      • DeleteObject.GDI32(?), ref: 00455736
                                      • DeleteObject.GDI32(?), ref: 00455744
                                      • DestroyIcon.USER32(?), ref: 00455752
                                      • DestroyWindow.USER32(?), ref: 00455760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                      • String ID:
                                      • API String ID: 3691411573-0
                                      • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                      • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                                      • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                      • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                                      APIs
                                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                      • LineTo.GDI32(?,?,?), ref: 004472AC
                                      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                      • LineTo.GDI32(?,?,?), ref: 004472C6
                                      • EndPath.GDI32(?), ref: 004472D6
                                      • StrokePath.GDI32(?), ref: 004472E4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                      • String ID:
                                      • API String ID: 372113273-0
                                      • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                      • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                      • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                      • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                      APIs
                                      • GetDC.USER32(00000000), ref: 0044CC6D
                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                      • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CapsDevice$Release
                                      • String ID:
                                      • API String ID: 1035833867-0
                                      • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                      • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                      • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                      • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                      APIs
                                      • __getptd.LIBCMT ref: 0041708E
                                        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                      • __amsg_exit.LIBCMT ref: 004170AE
                                      • __lock.LIBCMT ref: 004170BE
                                      • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                      • _free.LIBCMT ref: 004170EE
                                      • InterlockedIncrement.KERNEL32(02FB2D00), ref: 00417106
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                      • String ID:
                                      • API String ID: 3470314060-0
                                      • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                      • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                      • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                      • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                      • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                      • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                        • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                      • String ID:
                                      • API String ID: 3495660284-0
                                      • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                      • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                      • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                      • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                      APIs
                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Virtual
                                      • String ID:
                                      • API String ID: 4278518827-0
                                      • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                      • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                      • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                      • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                      APIs
                                      • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                      • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                      • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                      • ExitThread.KERNEL32 ref: 004151ED
                                      • __freefls@4.LIBCMT ref: 00415209
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                      • String ID:
                                      • API String ID: 442100245-0
                                      • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                      • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                      • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                      • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                      APIs
                                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                      • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                      • _wcslen.LIBCMT ref: 0045F94A
                                      • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                      • String ID: 0
                                      • API String ID: 621800784-4108050209
                                      • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                      • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                      • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                      • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • SetErrorMode.KERNEL32 ref: 004781CE
                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                      • SetErrorMode.KERNEL32(?), ref: 00478270
                                      • SetErrorMode.KERNEL32(?), ref: 00478340
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                      • String ID: \VH
                                      • API String ID: 3884216118-234962358
                                      • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                      • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                      • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                      • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                      • IsMenu.USER32(?), ref: 0044854D
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                      • DrawMenuBar.USER32 ref: 004485AF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$Item$DrawInfoInsert
                                      • String ID: 0
                                      • API String ID: 3076010158-4108050209
                                      • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                      • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                      • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                      • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                      • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$_memmove_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 1589278365-1403004172
                                      • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                      • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                      • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                      • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Handle
                                      • String ID: nul
                                      • API String ID: 2519475695-2873401336
                                      • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                      • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                      • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                      • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                      APIs
                                      • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Handle
                                      • String ID: nul
                                      • API String ID: 2519475695-2873401336
                                      • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                      • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                      • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                      • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                      APIs
                                      • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                      • _wcsncpy.LIBCMT ref: 00401C41
                                      • _wcscpy.LIBCMT ref: 00401C5D
                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                      • String ID: Line:
                                      • API String ID: 1874344091-1585850449
                                      • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                      • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                      • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                      • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: SysAnimate32
                                      • API String ID: 0-1011021900
                                      • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                      • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                      • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                      • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                      APIs
                                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                        • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                        • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                        • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                      • GetFocus.USER32 ref: 0046157B
                                        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                      • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                      • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                      • __swprintf.LIBCMT ref: 00461608
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                      • String ID: %s%d
                                      • API String ID: 2645982514-1110647743
                                      • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                      • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                      • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                      • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                      • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                      • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                      • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                      APIs
                                      • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                      • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                      • String ID:
                                      • API String ID: 3488606520-0
                                      • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                      • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                      • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                      • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                      APIs
                                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ConnectRegistry_memmove_wcslen
                                      • String ID:
                                      • API String ID: 15295421-0
                                      • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                      • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                      • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                      • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                      APIs
                                      • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                      • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                      • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$FreeLoad
                                      • String ID:
                                      • API String ID: 2449869053-0
                                      • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                      • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                      • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                      • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 004563A6
                                      • ScreenToClient.USER32(?,?), ref: 004563C3
                                      • GetAsyncKeyState.USER32(?), ref: 00456400
                                      • GetAsyncKeyState.USER32(?), ref: 00456410
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AsyncState$ClientCursorLongScreenWindow
                                      • String ID:
                                      • API String ID: 3539004672-0
                                      • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                      • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                      • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                      • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                      APIs
                                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                      • Sleep.KERNEL32(0000000A), ref: 0047D455
                                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Interlocked$DecrementIncrement$Sleep
                                      • String ID:
                                      • API String ID: 327565842-0
                                      • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                      • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                      • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                      • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                      APIs
                                      • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                      • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                      • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                      • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$SectionWrite$String
                                      • String ID:
                                      • API String ID: 2832842796-0
                                      • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                      • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                      • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                      • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                      APIs
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                      • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Enum$CloseDeleteOpen
                                      • String ID:
                                      • API String ID: 2095303065-0
                                      • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                      • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                      • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                      • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00436A24
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: RectWindow
                                      • String ID:
                                      • API String ID: 861336768-0
                                      • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                      • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                      • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                      • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                      APIs
                                      • SendMessageW.USER32 ref: 00449598
                                        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                      • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                      • _wcslen.LIBCMT ref: 0044960D
                                      • _wcslen.LIBCMT ref: 0044961A
                                      • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$_wcslen$_wcspbrk
                                      • String ID:
                                      • API String ID: 1856069659-0
                                      • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                      • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                      • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                      • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 004478E2
                                      • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                      • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                      • GetCursorPos.USER32(00000000), ref: 0044796A
                                      • TrackPopupMenuEx.USER32(02FB63B0,00000000,00000000,?,?,00000000), ref: 00447991
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CursorMenuPopupTrack$Proc
                                      • String ID:
                                      • API String ID: 1300944170-0
                                      • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                      • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                      • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                      • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 004479CC
                                      • GetCursorPos.USER32(?), ref: 004479D7
                                      • ScreenToClient.USER32(?,?), ref: 004479F3
                                      • WindowFromPoint.USER32(?,?), ref: 00447A34
                                      • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Client$CursorFromPointProcRectScreenWindow
                                      • String ID:
                                      • API String ID: 1822080540-0
                                      • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                      • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                      • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                      • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00447C5D
                                      • ScreenToClient.USER32(?,?), ref: 00447C7B
                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                      • EndPaint.USER32(?,?), ref: 00447D13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ClientPaintRectRectangleScreenViewportWindow
                                      • String ID:
                                      • API String ID: 659298297-0
                                      • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                      • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                      • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                      • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                      APIs
                                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                                        • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                        • Part of subcall function 00440D98: SendMessageW.USER32(02FB1AC8,000000F1,00000000,00000000), ref: 00440E6E
                                        • Part of subcall function 00440D98: SendMessageW.USER32(02FB1AC8,000000F1,00000001,00000000), ref: 00440E9A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$EnableMessageSend$LongShow
                                      • String ID:
                                      • API String ID: 142311417-0
                                      • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                      • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                      • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                      • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                      • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                      • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                      • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 00445879
                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                      • _wcslen.LIBCMT ref: 004458FB
                                      • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                      • String ID:
                                      • API String ID: 3087257052-0
                                      • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                      • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                      • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                      • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                      APIs
                                        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                      • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                      • closesocket.WSOCK32(00000000), ref: 00465481
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                      • String ID:
                                      • API String ID: 245547762-0
                                      • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                      • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                      • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                      • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 004471D8
                                      • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                      • SelectObject.GDI32(?,00000000), ref: 00447228
                                      • BeginPath.GDI32(?), ref: 0044723D
                                      • SelectObject.GDI32(?,00000000), ref: 00447266
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Object$Select$BeginCreateDeletePath
                                      • String ID:
                                      • API String ID: 2338827641-0
                                      • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                      • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                      • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                      • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                      APIs
                                      • Sleep.KERNEL32(00000000), ref: 00434598
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                      • Sleep.KERNEL32(00000000), ref: 004345D4
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CounterPerformanceQuerySleep
                                      • String ID:
                                      • API String ID: 2875609808-0
                                      • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                      • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                      • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                      • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                      • MessageBeep.USER32(00000000), ref: 00460C46
                                      • KillTimer.USER32(?,0000040A), ref: 00460C68
                                      • EndDialog.USER32(?,00000001), ref: 00460C83
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                      • String ID:
                                      • API String ID: 3741023627-0
                                      • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                      • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                      • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                      • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$DeleteObjectWindow$Icon
                                      • String ID:
                                      • API String ID: 4023252218-0
                                      • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                      • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                      • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                      • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                      APIs
                                      • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                      • DeleteObject.GDI32(?), ref: 00455736
                                      • DeleteObject.GDI32(?), ref: 00455744
                                      • DestroyIcon.USER32(?), ref: 00455752
                                      • DestroyWindow.USER32(?), ref: 00455760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DeleteDestroyObject$IconMessageSendWindow
                                      • String ID:
                                      • API String ID: 1489400265-0
                                      • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                      • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                      • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                      • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                      APIs
                                        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                      • DestroyWindow.USER32(?), ref: 00455728
                                      • DeleteObject.GDI32(?), ref: 00455736
                                      • DeleteObject.GDI32(?), ref: 00455744
                                      • DestroyIcon.USER32(?), ref: 00455752
                                      • DestroyWindow.USER32(?), ref: 00455760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                      • String ID:
                                      • API String ID: 1042038666-0
                                      • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                      • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                      • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                      • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                      • String ID:
                                      • API String ID: 2625713937-0
                                      • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                      • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                      • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                      • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                      APIs
                                      • __getptd.LIBCMT ref: 0041780F
                                        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                      • __getptd.LIBCMT ref: 00417826
                                      • __amsg_exit.LIBCMT ref: 00417834
                                      • __lock.LIBCMT ref: 00417844
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                      • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                      • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                      • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                      APIs
                                        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                      • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                      • ExitThread.KERNEL32 ref: 00413D4E
                                      • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                      • __freefls@4.LIBCMT ref: 00413D74
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                      • String ID:
                                      • API String ID: 2403457894-0
                                      • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                      • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                      • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                      • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                      APIs
                                        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                      • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                      • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                      • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                      • ExitThread.KERNEL32 ref: 004151ED
                                      • __freefls@4.LIBCMT ref: 00415209
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                      • String ID:
                                      • API String ID: 4247068974-0
                                      • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                      • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                      • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                      • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )$U$\
                                      • API String ID: 0-3705770531
                                      • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                      • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                      • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                      • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                      APIs
                                        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                      • CoInitialize.OLE32(00000000), ref: 0046E505
                                      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                      • CoUninitialize.OLE32 ref: 0046E53D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 886957087-24824748
                                      • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                      • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                      • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                      • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                      Strings
                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                      • API String ID: 708495834-557222456
                                      • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                      • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                      • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                      • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                      APIs
                                        • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                        • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                        • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                        • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                        • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                      • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                      • String ID: @
                                      • API String ID: 4150878124-2766056989
                                      • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                      • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                      • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                      • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: \$]$h
                                      • API String ID: 4104443479-3262404753
                                      • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                      • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                      • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                      • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                      APIs
                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                      • CloseHandle.KERNEL32(?), ref: 00457E09
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                      • String ID: <$@
                                      • API String ID: 2417854910-1426351568
                                      • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                      • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                      • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                      • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                      APIs
                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                      • String ID:
                                      • API String ID: 3705125965-3916222277
                                      • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                      • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                      • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                      • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                      APIs
                                      • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                      • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                      • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$Delete$InfoItem
                                      • String ID: 0
                                      • API String ID: 135850232-4108050209
                                      • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                      • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                      • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                      • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                      APIs
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID: SysTreeView32
                                      • API String ID: 847901565-1698111956
                                      • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                      • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                      • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                      • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                      APIs
                                      • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                      • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                      • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: AU3_GetPluginDetails
                                      • API String ID: 145871493-4132174516
                                      • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                      • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                      • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                      • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                      APIs
                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window
                                      • String ID: SysMonthCal32
                                      • API String ID: 2326795674-1439706946
                                      • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                      • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                      • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                      • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                      APIs
                                      • DestroyWindow.USER32(00000000), ref: 00450A2F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DestroyWindow
                                      • String ID: msctls_updown32
                                      • API String ID: 3375834691-2298589950
                                      • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                      • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                      • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                      • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: $<
                                      • API String ID: 4104443479-428540627
                                      • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                      • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                      • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                      • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID: \VH
                                      • API String ID: 1682464887-234962358
                                      • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                      • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                      • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                      • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID: \VH
                                      • API String ID: 1682464887-234962358
                                      • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                      • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                      • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                      • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID: \VH
                                      • API String ID: 1682464887-234962358
                                      • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                      • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                      • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                      • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume
                                      • String ID: \VH
                                      • API String ID: 2507767853-234962358
                                      • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                      • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                      • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                      • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume
                                      • String ID: \VH
                                      • API String ID: 2507767853-234962358
                                      • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                      • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                      • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                      • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                      APIs
                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                      • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: msctls_trackbar32
                                      • API String ID: 3850602802-1010561917
                                      • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                      • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                      • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                      • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                      • String ID: crts
                                      • API String ID: 943502515-3724388283
                                      • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                      • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                      • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                      • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                      • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                      • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorMode$LabelVolume
                                      • String ID: \VH
                                      • API String ID: 2006950084-234962358
                                      • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                      • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                      • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                      • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                      APIs
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • GetMenuItemInfoW.USER32 ref: 00449727
                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                      • DrawMenuBar.USER32 ref: 00449761
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Menu$InfoItem$Draw_malloc
                                      • String ID: 0
                                      • API String ID: 772068139-4108050209
                                      • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                      • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                      • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                      • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$_wcscpy
                                      • String ID: 3, 3, 8, 1
                                      • API String ID: 3469035223-357260408
                                      • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                      • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                      • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                      • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                      APIs
                                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                      • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: ICMP.DLL$IcmpCloseHandle
                                      • API String ID: 2574300362-3530519716
                                      • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                      • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                      • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                      • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                      APIs
                                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                      • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: ICMP.DLL$IcmpCreateFile
                                      • API String ID: 2574300362-275556492
                                      • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                      • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                      • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                      • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                      APIs
                                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                      • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: ICMP.DLL$IcmpSendEcho
                                      • API String ID: 2574300362-58917771
                                      • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                      • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                      • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                      • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 2574300362-4033151799
                                      • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                      • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                      • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                      • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                      • API String ID: 2574300362-1816364905
                                      • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                      • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                                      • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                      • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                      • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                      • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                      • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 0047950F
                                      • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                      • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                      • VariantClear.OLEAUT32(?), ref: 00479650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$AllocClearCopyInitString
                                      • String ID:
                                      • API String ID: 2808897238-0
                                      • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                      • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                      • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                      • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                      APIs
                                      • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                      • __itow.LIBCMT ref: 004699CD
                                        • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                      • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                      • __itow.LIBCMT ref: 00469A97
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$__itow
                                      • String ID:
                                      • API String ID: 3379773720-0
                                      • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                      • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                      • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                      • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00449A4A
                                      • ScreenToClient.USER32(?,?), ref: 00449A80
                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$ClientMoveRectScreen
                                      • String ID:
                                      • API String ID: 3880355969-0
                                      • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                      • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                      • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                      • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                      • String ID:
                                      • API String ID: 2782032738-0
                                      • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                      • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                      • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                      • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                      APIs
                                      • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                      • GetWindowRect.USER32(?,?), ref: 00441722
                                      • PtInRect.USER32(?,?,?), ref: 00441734
                                      • MessageBeep.USER32(00000000), ref: 004417AD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Rect$BeepClientMessageScreenWindow
                                      • String ID:
                                      • API String ID: 1352109105-0
                                      • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                      • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                      • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                      • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                      APIs
                                      • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                      • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                      • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                      • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                      • String ID:
                                      • API String ID: 3321077145-0
                                      • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                      • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                      • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                      • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                      APIs
                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                      • __isleadbyte_l.LIBCMT ref: 004208A6
                                      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                      • String ID:
                                      • API String ID: 3058430110-0
                                      • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                      • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                      • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                      • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                      APIs
                                      • GetParent.USER32(?), ref: 004503C8
                                      • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                      • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                      • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Proc$Parent
                                      • String ID:
                                      • API String ID: 2351499541-0
                                      • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                      • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                      • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                      • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                      APIs
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                      • TranslateMessage.USER32(?), ref: 00442B01
                                      • DispatchMessageW.USER32(?), ref: 00442B0B
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Message$Peek$DispatchTranslate
                                      • String ID:
                                      • API String ID: 1795658109-0
                                      • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                      • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                      • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                      • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                      APIs
                                      • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                      • GetCaretPos.USER32(?), ref: 004743B2
                                      • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                      • GetForegroundWindow.USER32 ref: 004743EE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                      • String ID:
                                      • API String ID: 2759813231-0
                                      • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                      • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                      • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                      • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                      APIs
                                        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                      • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                      • _wcslen.LIBCMT ref: 00449519
                                      • _wcslen.LIBCMT ref: 00449526
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend_wcslen$_wcspbrk
                                      • String ID:
                                      • API String ID: 2886238975-0
                                      • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                      • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                      • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                      • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __setmode$DebugOutputString_fprintf
                                      • String ID:
                                      • API String ID: 1792727568-0
                                      • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                      • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                      • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                      • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                      APIs
                                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                      • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$Long$AttributesLayered
                                      • String ID:
                                      • API String ID: 2169480361-0
                                      • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                      • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                      • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                      • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                      APIs
                                        • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                        • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                        • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                      • lstrlenW.KERNEL32(?), ref: 00434CF6
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                      • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: lstrcmpilstrcpylstrlen$_malloc
                                      • String ID: cdecl
                                      • API String ID: 3850814276-3896280584
                                      • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                      • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                      • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                      • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                      APIs
                                        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                      • gethostbyname.WSOCK32(?), ref: 0046D42D
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                      • _memmove.LIBCMT ref: 0046D475
                                      • inet_ntoa.WSOCK32(?), ref: 0046D481
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                      • String ID:
                                      • API String ID: 2502553879-0
                                      • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                      • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                      • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                      • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                      APIs
                                      • SendMessageW.USER32 ref: 00448C69
                                      • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                      • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow
                                      • String ID:
                                      • API String ID: 312131281-0
                                      • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                      • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                      • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                      • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                      APIs
                                      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                      • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLastacceptselect
                                      • String ID:
                                      • API String ID: 385091864-0
                                      • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                      • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                      • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                      • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                      APIs
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                      • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                      • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                      • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                      • GetStockObject.GDI32(00000011), ref: 00430258
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                      • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Window$CreateMessageObjectSendShowStock
                                      • String ID:
                                      • API String ID: 1358664141-0
                                      • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                      • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                      • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                      • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                      • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                      • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                      • String ID:
                                      • API String ID: 2880819207-0
                                      • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                      • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                      • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                      • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00430BA2
                                      • ScreenToClient.USER32(?,?), ref: 00430BC1
                                      • ScreenToClient.USER32(?,?), ref: 00430BE2
                                      • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ClientRectScreen$InvalidateWindow
                                      • String ID:
                                      • API String ID: 357397906-0
                                      • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                      • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                      • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                      • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                      APIs
                                      • __wsplitpath.LIBCMT ref: 0043392E
                                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                      • __wsplitpath.LIBCMT ref: 00433950
                                      • __wcsicoll.LIBCMT ref: 00433974
                                      • __wcsicoll.LIBCMT ref: 0043398A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                      • String ID:
                                      • API String ID: 1187119602-0
                                      • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                      • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                      • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                      • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _wcslen$_malloc_wcscat_wcscpy
                                      • String ID:
                                      • API String ID: 1597257046-0
                                      • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                      • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                      • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                      • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                      • __malloc_crt.LIBCMT ref: 0041F5B6
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: EnvironmentStrings$Free__malloc_crt
                                      • String ID:
                                      • API String ID: 237123855-0
                                      • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                      • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                      • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                      • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: DeleteDestroyObject$IconWindow
                                      • String ID:
                                      • API String ID: 3349847261-0
                                      • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                      • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                      • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                      • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                      • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                      • String ID:
                                      • API String ID: 2223660684-0
                                      • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                      • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                      • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                      • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                      APIs
                                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                      • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                      • LineTo.GDI32(?,?,?), ref: 00447326
                                      • EndPath.GDI32(?), ref: 00447336
                                      • StrokePath.GDI32(?), ref: 00447344
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                      • String ID:
                                      • API String ID: 2783949968-0
                                      • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                      • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                      • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                      • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                      APIs
                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                      • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                      • AttachThreadInput.USER32(00000000), ref: 004364AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                      • String ID:
                                      • API String ID: 2710830443-0
                                      • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                      • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                      • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                      • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                      • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                        • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                        • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                      • String ID:
                                      • API String ID: 146765662-0
                                      • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                      • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                      • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                      • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 00472B63
                                      • GetDC.USER32(00000000), ref: 00472B6C
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                      • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                      • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                      • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                      • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 00472BB2
                                      • GetDC.USER32(00000000), ref: 00472BBB
                                      • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                      • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                      • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                      • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                      • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                      APIs
                                      • __getptd_noexit.LIBCMT ref: 00415150
                                        • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                        • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                        • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                        • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                        • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                      • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                      • __freeptd.LIBCMT ref: 0041516B
                                      • ExitThread.KERNEL32 ref: 00415173
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                      • String ID:
                                      • API String ID: 1454798553-0
                                      • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                      • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                      • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                      • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _strncmp
                                      • String ID: Q\E
                                      • API String ID: 909875538-2189900498
                                      • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                      • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                      • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                      • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                      APIs
                                      • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                      • String ID: AutoIt3GUI$Container
                                      • API String ID: 2652923123-3941886329
                                      • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                      • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                      • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                      • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove_strncmp
                                      • String ID: U$\
                                      • API String ID: 2666721431-100911408
                                      • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                      • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                      • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                      • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                      APIs
                                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                      • __wcsnicmp.LIBCMT ref: 00467288
                                      • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                      • String ID: LPT
                                      • API String ID: 3035604524-1350329615
                                      • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                      • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                      • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                      • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: \$h
                                      • API String ID: 4104443479-677774858
                                      • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                      • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                      • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                      • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memcmp
                                      • String ID: &
                                      • API String ID: 2931989736-1010288
                                      • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                      • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                      • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                      • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: \
                                      • API String ID: 4104443479-2967466578
                                      • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                      • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                      • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                      • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                      APIs
                                      • _wcslen.LIBCMT ref: 00466825
                                      • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CrackInternet_wcslen
                                      • String ID: |
                                      • API String ID: 596671847-2343686810
                                      • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                      • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                      • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                      • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                      APIs
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: '
                                      • API String ID: 3850602802-1997036262
                                      • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                      • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                      • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                      • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                      APIs
                                      • _strlen.LIBCMT ref: 0040F858
                                        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                      • _sprintf.LIBCMT ref: 0040F9AE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove$_sprintf_strlen
                                      • String ID: %02X
                                      • API String ID: 1921645428-436463671
                                      • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                      • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                      • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                      • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                      APIs
                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: Combobox
                                      • API String ID: 3850602802-2096851135
                                      • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                      • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                      • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                      • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                      APIs
                                      • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: LengthMessageSendTextWindow
                                      • String ID: edit
                                      • API String ID: 2978978980-2167791130
                                      • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                      • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                      • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                      • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                      APIs
                                      • Sleep.KERNEL32(00000000), ref: 00476CB0
                                      • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: GlobalMemorySleepStatus
                                      • String ID: @
                                      • API String ID: 2783356886-2766056989
                                      • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                      • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                      • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                      • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: htonsinet_addr
                                      • String ID: 255.255.255.255
                                      • API String ID: 3832099526-2422070025
                                      • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                      • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                      • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                      • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                      APIs
                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: InternetOpen
                                      • String ID: <local>
                                      • API String ID: 2038078732-4266983199
                                      • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                      • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                      • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                      • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: __fread_nolock_memmove
                                      • String ID: EA06
                                      • API String ID: 1988441806-3962188686
                                      • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                      • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                      • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                      • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: u,D
                                      • API String ID: 4104443479-3858472334
                                      • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                      • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                      • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                      • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: Error:
                                      • API String ID: 4104443479-232661952
                                      • Opcode ID: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
                                      • Instruction ID: e6e9f2aa443a554b8bda50df2a041f2c42dbd20d32390c21629c974d0e28b4a3
                                      • Opcode Fuzzy Hash: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
                                      • Instruction Fuzzy Hash: 2101EFB6200115ABC704DF49D981D6AF7A9FF88710708855AF819CB302D774FD20CBA4
                                      APIs
                                      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                      • wsprintfW.USER32 ref: 0045612A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: MessageSend_mallocwsprintf
                                      • String ID: %d/%02d/%02d
                                      • API String ID: 1262938277-328681919
                                      • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                      • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                      • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                      • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                      APIs
                                      • InternetCloseHandle.WININET(?), ref: 00442663
                                      • InternetCloseHandle.WININET ref: 00442668
                                        • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: CloseHandleInternet$ObjectSingleWait
                                      • String ID: aeB
                                      • API String ID: 857135153-906807131
                                      • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                      • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                      • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                      • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                      • PostMessageW.USER32(00000000), ref: 00441C05
                                        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                      • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                      • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                      • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                      • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                      • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                      • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                      APIs
                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                        • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2104073231.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2104055661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104119871.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104145855.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104161639.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104178448.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2104236572.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_PO-A1702108.jbxd
                                      Similarity
                                      • API ID: Message_doexit
                                      • String ID: AutoIt$Error allocating memory.
                                      • API String ID: 1993061046-4017498283
                                      • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                      • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                      • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                      • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D