Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ItPTgiBC07.exe

Overview

General Information

Sample name:ItPTgiBC07.exe
renamed because original name is a hash value
Original sample name:f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f.exe
Analysis ID:1529060
MD5:14a18fb3ad6f796e93c8aa1e9c7f34f6
SHA1:9b5cb8fae133d1033816260815061699d54c082a
SHA256:f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ItPTgiBC07.exe (PID: 5684 cmdline: "C:\Users\user\Desktop\ItPTgiBC07.exe" MD5: 14A18FB3AD6F796E93C8AA1E9C7F34F6)
    • nonagglutinant.exe (PID: 4856 cmdline: "C:\Users\user\Desktop\ItPTgiBC07.exe" MD5: 14A18FB3AD6F796E93C8AA1E9C7F34F6)
      • RegSvcs.exe (PID: 712 cmdline: "C:\Users\user\Desktop\ItPTgiBC07.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • nonagglutinant.exe (PID: 4048 cmdline: "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" MD5: 14A18FB3AD6F796E93C8AA1E9C7F34F6)
        • RegSvcs.exe (PID: 6812 cmdline: "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • WMIADAP.exe (PID: 6812 cmdline: wmiadap.exe /F /T /R MD5: 1BFFABBD200C850E6346820E92B915DC)
      • wscript.exe (PID: 712 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
        • nonagglutinant.exe (PID: 4684 cmdline: "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" MD5: 14A18FB3AD6F796E93C8AA1E9C7F34F6)
          • RegSvcs.exe (PID: 5772 cmdline: "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000A.00000002.1307612305.0000000003B00000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 A8 88 44 24 2B 88 44 24 2F B0 AF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          11.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 A8 88 44 24 2B 88 44 24 2F B0 AF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          10.2.nonagglutinant.exe.3b00000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 A8 88 44 24 2B 88 44 24 2F B0 AF 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          11.2.RegSvcs.exe.4566458.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            11.2.RegSvcs.exe.4566458.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              11.2.RegSvcs.exe.4566458.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 64 entries

                System Summary

                barindex
                Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wscript.exe, SourceProcessId: 712, StartAddress: 7B1FBCC0, TargetImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, TargetProcessId: 712
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\ItPTgiBC07.exe", ParentImage: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe, ParentProcessId: 4856, ParentProcessName: nonagglutinant.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , ProcessId: 712, ProcessName: wscript.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.54.122.135, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6812, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49700
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\ItPTgiBC07.exe", ParentImage: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe, ParentProcessId: 4856, ParentProcessName: nonagglutinant.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs" , ProcessId: 712, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe, ProcessId: 4856, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.privateemail.com", "Username": "pin@hm-heating-de.icu", "Password": "mGr{)g5TVG3j"}
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeReversingLabs: Detection: 76%
                Source: ItPTgiBC07.exeReversingLabs: Detection: 76%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeJoe Sandbox ML: detected
                Source: ItPTgiBC07.exeJoe Sandbox ML: detected
                Source: ItPTgiBC07.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49732 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2512493241.0000000002EEC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: nonagglutinant.exe, 00000008.00000003.1290601901.0000000004610000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 00000008.00000003.1290271408.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301536609.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301821263.0000000004670000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1397575538.00000000044B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1396156892.0000000004650000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: nonagglutinant.exe, 00000008.00000003.1290601901.0000000004610000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 00000008.00000003.1290271408.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301536609.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301821263.0000000004670000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1397575538.00000000044B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1396156892.0000000004650000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00452492
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00442886
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_004788BD
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,10_2_004339B6
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,10_2_0045CAFA
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00431A86
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,10_2_0044BD27
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0045DE8F FindFirstFileW,FindClose,10_2_0045DE8F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_0044BF8B
                Source: global trafficTCP traffic: 192.168.2.7:49700 -> 198.54.122.135:587
                Source: Joe Sandbox ViewIP Address: 198.54.122.135 198.54.122.135
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficTCP traffic: 192.168.2.7:49700 -> 198.54.122.135:587
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004422FE InternetQueryDataAvailable,InternetReadFile,4_2_004422FE
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: mail.privateemail.com
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005834000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: RegSvcs.exe, 0000000B.00000002.1406090669.0000000005A14000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.privateemail.com
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005834000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 0000000B.00000002.1406090669.0000000005A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                Source: RegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49732 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, SKTzxzsJw.cs.Net Code: mWXy4
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,4_2_0045A10F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,4_2_0045A10F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_0045A10F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,4_2_0046DC80
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,4_2_0044C37A
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_0047C81C
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_0047C81C

                System Summary

                barindex
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 10.2.nonagglutinant.exe.3b00000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 8.2.nonagglutinant.exe.3c00000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 14.2.nonagglutinant.exe.3c10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0000000A.00000002.1307612305.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0000000E.00000002.1399638845.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0000000B.00000002.1399759379.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000008.00000002.1293667148.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,4_2_00431BE8
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,4_2_00446313
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,10_2_004333BE
                Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.hJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004096A04_2_004096A0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0042200C4_2_0042200C
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0041A2174_2_0041A217
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004122164_2_00412216
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0042435D4_2_0042435D
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004033C04_2_004033C0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044F4304_2_0044F430
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004125E84_2_004125E8
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044663B4_2_0044663B
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004138014_2_00413801
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0042096F4_2_0042096F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004129D04_2_004129D0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004119E34_2_004119E3
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0041C9AE4_2_0041C9AE
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0047EA6F4_2_0047EA6F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040FA104_2_0040FA10
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044EB5F4_2_0044EB5F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00423C814_2_00423C81
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00411E784_2_00411E78
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00442E0C4_2_00442E0C
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00420EC04_2_00420EC0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044CF174_2_0044CF17
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00444FD24_2_00444FD2
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_041026D84_2_041026D8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 8_2_041726B88_2_041726B8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004096A010_2_004096A0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0042200C10_2_0042200C
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041A21710_2_0041A217
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041221610_2_00412216
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0042435D10_2_0042435D
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004033C010_2_004033C0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044F43010_2_0044F430
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004125E810_2_004125E8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044663B10_2_0044663B
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041380110_2_00413801
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0042096F10_2_0042096F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004129D010_2_004129D0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004119E310_2_004119E3
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041C9AE10_2_0041C9AE
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0047EA6F10_2_0047EA6F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0040FA1010_2_0040FA10
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044EB5F10_2_0044EB5F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00423C8110_2_00423C81
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00411E7810_2_00411E78
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00442E0C10_2_00442E0C
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00420EC010_2_00420EC0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044CF1710_2_0044CF17
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00444FD210_2_00444FD2
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0402D6C010_2_0402D6C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00408C6011_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040DC1111_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00407C3F11_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00418CCC11_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00406CA011_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004028B011_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041A4BE11_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041824411_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040165011_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402F2011_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004193C411_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041878811_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402F8911_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00402B9011_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004073A011_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F8D78011_2_02F8D780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F8CB6811_2_02F8CB68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F8CEB011_2_02F8CEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F80FD011_2_02F80FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F8130C11_2_02F8130C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F8103011_2_02F81030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06045E4811_2_06045E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0604B7D811_2_0604B7D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_060465D111_2_060465D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0604E8B011_2_0604E8B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0604919011_2_06049190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0604000611_2_06040006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0604004011_2_06040040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06C04E0811_2_06C04E08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06C05D9011_2_06C05D90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06C0110011_2_06C01100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06C07F9811_2_06C07F98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_06C09D9111_2_06C09D91
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 14_2_040B1B4014_2_040B1B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012DCB6815_2_012DCB68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012DD78015_2_012DD780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012D103015_2_012D1030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012D0FD015_2_012D0FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012DCEB015_2_012DCEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E665C915_2_05E665C9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E6B7C815_2_05E6B7C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E65E3815_2_05E65E38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E6918015_2_05E69180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E6004015_2_05E60040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E6000615_2_05E60006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_05E6F00015_2_05E6F000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A3004015_2_06A30040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A34E4015_2_06A34E40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A39CF815_2_06A39CF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A35DC815_2_06A35DC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A3113815_2_06A31138
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_06A37FD015_2_06A37FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: String function: 004115D7 appears 36 times
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: String function: 00416C70 appears 39 times
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: String function: 00445AE0 appears 65 times
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: String function: 004115D7 appears 36 times
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: String function: 00416C70 appears 39 times
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: String function: 00445AE0 appears 65 times
                Source: ItPTgiBC07.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 10.2.nonagglutinant.exe.3b00000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 8.2.nonagglutinant.exe.3c00000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 14.2.nonagglutinant.exe.3c10000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0000000A.00000002.1307612305.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0000000E.00000002.1399638845.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0000000B.00000002.1399759379.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000008.00000002.1293667148.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@15/4@2/2
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044AF6C GetLastError,FormatMessageW,4_2_0044AF6C
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,4_2_00464EAE
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,10_2_004333BE
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,10_2_00464EAE
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,4_2_0045D619
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,4_2_004755C4
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,4_2_0047839D
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,4_2_0043305F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeFile created: C:\Users\user\AppData\Local\KeilyJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex
                Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Flag
                Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\ADAP_WMI_ENTRY
                Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Lib
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeFile created: C:\Users\user~1\AppData\Local\Temp\orographicallyJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs"
                Source: ItPTgiBC07.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ItPTgiBC07.exeReversingLabs: Detection: 76%
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeFile read: C:\Users\user\Desktop\ItPTgiBC07.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ItPTgiBC07.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" Jump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: loadperf.dllJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: ItPTgiBC07.exeStatic file information: File size 1343097 > 1048576
                Source: Binary string: _.pdb source: RegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2512493241.0000000002EEC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: nonagglutinant.exe, 00000008.00000003.1290601901.0000000004610000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 00000008.00000003.1290271408.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301536609.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301821263.0000000004670000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1397575538.00000000044B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1396156892.0000000004650000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: nonagglutinant.exe, 00000008.00000003.1290601901.0000000004610000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 00000008.00000003.1290271408.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301536609.00000000044D0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000A.00000003.1301821263.0000000004670000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1397575538.00000000044B0000.00000004.00001000.00020000.00000000.sdmp, nonagglutinant.exe, 0000000E.00000003.1396156892.0000000004650000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040EBD0 LoadLibraryA,GetProcAddress,4_2_0040EBD0
                Source: ItPTgiBC07.exeStatic PE information: real checksum: 0xa961f should be: 0x157135
                Source: nonagglutinant.exe.4.drStatic PE information: real checksum: 0xa961f should be: 0x157135
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00416CB5 push ecx; ret 4_2_00416CC8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00416CB5 push ecx; ret 10_2_00416CC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C40C push cs; iretd 11_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00423149 push eax; ret 11_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C50E push cs; iretd 11_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004231C8 push eax; ret 11_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040E21D push ecx; ret 11_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0041C6BE push ebx; ret 11_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F84394 push cs; iretd 11_2_02F843A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F84359 push ebx; iretd 11_2_02F84362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02F84F14 pushfd ; ret 11_2_02F84F19
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012D4F14 pushfd ; ret 15_2_012D4F19
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012D4359 push ebx; iretd 15_2_012D4362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_012D4394 push cs; iretd 15_2_012D43A7
                Source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'qD3UnLw5BfgoE', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'qD3UnLw5BfgoE', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'qD3UnLw5BfgoE', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'qD3UnLw5BfgoE', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'qD3UnLw5BfgoE', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeFile created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbsJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,4_2_0047A330
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,4_2_00434418
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_0047A330
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00434418
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeAPI/Special instruction interceptor: Address: 41722DC
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeAPI/Special instruction interceptor: Address: 402D2E4
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeAPI/Special instruction interceptor: Address: 40B1764
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,11_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1214Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4133Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 631Jump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_4-87561
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeAPI coverage: 3.4 %
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeAPI coverage: 3.5 %
                Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 1652Thread sleep count: 272 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\wbem\WMIADAP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00452492
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00442886
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_004788BD
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,10_2_004339B6
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,10_2_0045CAFA
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00431A86
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,10_2_0044BD27
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0045DE8F FindFirstFileW,FindClose,10_2_0045DE8F
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_0044BF8B
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,4_2_0040E500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99327Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98559Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98424Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98003Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97337Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98694Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97991Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97657Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97295Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 0000000B.00000002.1406090669.0000000005A14000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005834000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0045A370 BlockInput,4_2_0045A370
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,4_2_0040D590
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,11_2_004019F0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040EBD0 LoadLibraryA,GetProcAddress,4_2_0040EBD0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_04102568 mov eax, dword ptr fs:[00000030h]4_2_04102568
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_041025C8 mov eax, dword ptr fs:[00000030h]4_2_041025C8
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_04100ED8 mov eax, dword ptr fs:[00000030h]4_2_04100ED8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 8_2_04172548 mov eax, dword ptr fs:[00000030h]8_2_04172548
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 8_2_04170EB8 mov eax, dword ptr fs:[00000030h]8_2_04170EB8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 8_2_041725A8 mov eax, dword ptr fs:[00000030h]8_2_041725A8
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0402D550 mov eax, dword ptr fs:[00000030h]10_2_0402D550
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0402D5B0 mov eax, dword ptr fs:[00000030h]10_2_0402D5B0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0402BEC0 mov eax, dword ptr fs:[00000030h]10_2_0402BEC0
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 14_2_040B1A30 mov eax, dword ptr fs:[00000030h]14_2_040B1A30
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 14_2_040B0340 mov eax, dword ptr fs:[00000030h]14_2_040B0340
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 14_2_040B19D0 mov eax, dword ptr fs:[00000030h]14_2_040B19D0
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,4_2_004238DA
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0041F250 SetUnhandledExceptionFilter,4_2_0041F250
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0041A208
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00417DAA
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041F250 SetUnhandledExceptionFilter,10_2_0041F250
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0041A208
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00417DAA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_004123F1 SetUnhandledExceptionFilter,11_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: NULL target: C:\Windows\System32\wbem\WMIADAP.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 11DF008Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E76008Jump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00436CD7 LogonUserW,4_2_00436CD7
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,4_2_0040D590
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,4_2_00434418
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,4_2_0043333C
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ItPTgiBC07.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Keily\nonagglutinant.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Keily\nonagglutinant.exe" Jump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,4_2_00446124
                Source: ItPTgiBC07.exe, nonagglutinant.exeBinary or memory string: Shell_TrayWnd
                Source: ItPTgiBC07.exe, nonagglutinant.exe.4.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,11_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,4_2_004720DB
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00472C3F GetUserNameW,4_2_00472C3F
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,4_2_0041E364
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,4_2_0040E500
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2514523591.00000000032D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6812, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5772, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: nonagglutinant.exeBinary or memory string: WIN_XP
                Source: nonagglutinant.exe.4.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                Source: nonagglutinant.exeBinary or memory string: WIN_XPe
                Source: nonagglutinant.exeBinary or memory string: WIN_VISTA
                Source: nonagglutinant.exeBinary or memory string: WIN_7
                Source: nonagglutinant.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2514523591.00000000032D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6812, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5772, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1404097794.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2514523591.00000000032D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6812, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5772, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4566458.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.45b3190.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2ffff0e.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.34f0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.2fff026.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.3460ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.RegSvcs.exe.4565570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,4_2_004652BE
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,4_2_00476619
                Source: C:\Users\user\Desktop\ItPTgiBC07.exeCode function: 4_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,4_2_0046CEF3
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,10_2_004652BE
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00476619
                Source: C:\Users\user\AppData\Local\Keily\nonagglutinant.exeCode function: 10_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,10_2_0046CEF3
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                121
                Windows Management Instrumentation
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                Software Packing
                NTDS138
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets341
                Security Software Discovery
                SSH3
                Clipboard Data
                23
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                11
                Masquerading
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                Process Injection
                Network Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529060 Sample: ItPTgiBC07.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 39 mail.privateemail.com 2->39 41 api.ipify.org 2->41 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 9 other signatures 2->69 10 ItPTgiBC07.exe 3 2->10         started        signatures3 process4 file5 35 C:\Users\user\AppData\...\nonagglutinant.exe, PE32 10->35 dropped 13 nonagglutinant.exe 1 10->13         started        process6 file7 37 C:\Users\user\AppData\...\nonagglutinant.vbs, data 13->37 dropped 81 Multi AV Scanner detection for dropped file 13->81 83 Machine Learning detection for dropped file 13->83 85 Drops VBS files to the startup folder 13->85 87 Switches to a custom stack to bypass stack traces 13->87 17 wscript.exe 1 13->17         started        20 nonagglutinant.exe 13->20         started        22 RegSvcs.exe 13->22         started        signatures8 process9 signatures10 55 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->55 24 nonagglutinant.exe 17->24         started        57 Writes to foreign memory regions 20->57 59 Maps a DLL or memory area into another process 20->59 27 RegSvcs.exe 15 2 20->27         started        30 WMIADAP.exe 2 20->30         started        61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 22->61 process11 dnsIp12 71 Writes to foreign memory regions 24->71 73 Maps a DLL or memory area into another process 24->73 32 RegSvcs.exe 2 24->32         started        43 mail.privateemail.com 198.54.122.135, 49700, 49744, 587 NAMECHEAP-NETUS United States 27->43 45 api.ipify.org 172.67.74.152, 443, 49699, 49732 CLOUDFLARENETUS United States 27->45 75 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->75 77 Tries to steal Mail credentials (via file / registry access) 27->77 79 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 30->79 signatures13 process14 signatures15 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->47 49 Tries to steal Mail credentials (via file / registry access) 32->49 51 Tries to harvest and steal ftp login credentials 32->51 53 Tries to harvest and steal browser information (history, passwords, etc) 32->53

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                ItPTgiBC07.exe76%ReversingLabsWin32.Trojan.Autoitinject
                ItPTgiBC07.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Keily\nonagglutinant.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Keily\nonagglutinant.exe76%ReversingLabsWin32.Trojan.Autoitinject
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.org/0%URL Reputationsafe
                https://api.ipify.org0%URL Reputationsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://api.ipify.org/t0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.privateemail.com
                198.54.122.135
                truetrue
                  unknown
                  api.ipify.org
                  172.67.74.152
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://api.ipify.orgRegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://sectigo.com/CPS0RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.microsoft.cRegSvcs.exe, 0000000B.00000002.1406090669.0000000005A14000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://account.dyn.com/RegSvcs.exe, 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0RegSvcs.exe, 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.1400523113.000000000135F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2511717472.0000000001367000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2518888112.0000000005876000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tRegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.privateemail.comRegSvcs.exe, 0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000B.00000002.1404097794.0000000003561000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000F.00000002.2514523591.0000000003290000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          198.54.122.135
                          mail.privateemail.comUnited States
                          22612NAMECHEAP-NETUStrue
                          172.67.74.152
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1529060
                          Start date and time:2024-10-08 15:52:15 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 8m 27s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:21
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:ItPTgiBC07.exe
                          renamed because original name is a hash value
                          Original Sample Name:f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.expl.evad.winEXE@15/4@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 53
                          • Number of non-executed functions: 310
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: ItPTgiBC07.exe
                          TimeTypeDescription
                          09:53:16API Interceptor50x Sleep call for process: RegSvcs.exe modified
                          15:53:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          198.54.122.135q6utlq83i0.exeGet hashmaliciousUnknownBrowse
                            PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  DO9uvdGMde.exeGet hashmaliciousAgentTeslaBrowse
                                    4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                      SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                                        IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                                              172.67.74.152file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                                              • api.ipify.org/
                                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                              • api.ipify.org/
                                              2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                              • api.ipify.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              mail.privateemail.comq6utlq83i0.exeGet hashmaliciousUnknownBrowse
                                              • 198.54.122.135
                                              PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 198.54.122.135
                                              PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 198.54.122.135
                                              PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 198.54.122.135
                                              DO9uvdGMde.exeGet hashmaliciousAgentTeslaBrowse
                                              • 198.54.122.135
                                              4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                              • 198.54.122.135
                                              SecuriteInfo.com.W32.MSIL_Kryptik.KUK.gen.Eldorado.13479.2252.exeGet hashmaliciousAgentTeslaBrowse
                                              • 198.54.122.135
                                              IMPORT PO2024-0961 ASTG.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 198.54.122.135
                                              RFQ New Order - 57m#U00b3 LPG SEMI TRAILER 7 NOS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 198.54.122.135
                                              Solicitud de precio Img_Quotation PO 202400931.exeGet hashmaliciousAgentTeslaBrowse
                                              • 198.54.122.135
                                              api.ipify.orgosjCeEFNrF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.13.205
                                              LYqMgahOY0.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.12.205
                                              vD6qU34v9S.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              q6utlq83i0.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.12.205
                                              QUOTATIONS#08673.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              shipping.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.12.205
                                              SPARES REQUISITION.XLSX.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.12.205
                                              CMB FLORIS DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              SUN ACE TBN VESSEL DETAILS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.13.205
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              NAMECHEAP-NETUSN2Qncau2rN.exeGet hashmaliciousFormBookBrowse
                                              • 199.192.19.19
                                              q6utlq83i0.exeGet hashmaliciousUnknownBrowse
                                              • 198.54.122.135
                                              RQ#071024.exeGet hashmaliciousFormBookBrowse
                                              • 162.0.238.43
                                              8mmZ7Bkoj1.exeGet hashmaliciousFormBookBrowse
                                              • 199.192.21.169
                                              FDA.exeGet hashmaliciousFormBookBrowse
                                              • 198.54.125.199
                                              PURCHASED ORDER OF ENG091.exeGet hashmaliciousFormBookBrowse
                                              • 63.250.38.167
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 162.255.117.53
                                              PO_89_202876.Pdf.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                              • 198.54.114.247
                                              Products Order Catalogs20242.exeGet hashmaliciousFormBookBrowse
                                              • 68.65.122.222
                                              IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                                              • 162.213.249.216
                                              CLOUDFLARENETUSGrsefI1q4s.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              Scan08.10.24(Massimiliano.benso)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 104.18.11.207
                                              V6SBOrgGcr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              rliquida____odefaturadepagamento.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                              • 188.114.96.3
                                              PO20241008.xlsGet hashmaliciousUnknownBrowse
                                              • 188.114.96.3
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.53.8
                                              PO20241008.xlsGet hashmaliciousUnknownBrowse
                                              • 188.114.96.3
                                              original (3).emlGet hashmaliciousUnknownBrowse
                                              • 172.64.41.3
                                              https://dvj-305jg-9h.car-financeclaim.co.uk/4-604-9vh-9h35g-h3.html#info@tintolaw.co.zaGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0eGrsefI1q4s.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.74.152
                                              V6SBOrgGcr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.74.152
                                              Update.jsGet hashmaliciousNetSupport RATBrowse
                                              • 172.67.74.152
                                              osjCeEFNrF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              LYqMgahOY0.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              Request for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.74.152
                                              3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 172.67.74.152
                                              vD6qU34v9S.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              q6utlq83i0.exeGet hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              No context
                                              Process:C:\Users\user\Desktop\ItPTgiBC07.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:modified
                                              Size (bytes):1343097
                                              Entropy (8bit):7.530445629289875
                                              Encrypted:false
                                              SSDEEP:24576:uRmJkcoQricOIQxiZY1iaClwbmA2JR50tFQyuiBjXaSg14r9c86O1dPr:7JZoQrbTFZY1iaClVdytG4ZbhKW
                                              MD5:14A18FB3AD6F796E93C8AA1E9C7F34F6
                                              SHA1:9B5CB8FAE133D1033816260815061699D54C082A
                                              SHA-256:F89E6918FBD3CCF0E58A7165C916B465F5D008BB8EB1D21D98F6D3144E86C40F
                                              SHA-512:AB1D08792A0AAFAD461C4B44E7F0F167A5D6A142BE7F4497F47A003B8B3E08F76B257FD73A918619A3AF969E57B7F56381D086CAE91E6111F0699CEE0BBBB33B
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 76%
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\ItPTgiBC07.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):267776
                                              Entropy (8bit):7.897051978614028
                                              Encrypted:false
                                              SSDEEP:6144:wqUp3YdKh977q570mxINobzO4BFUCaRkqglebQz20Nc:6Zh9/qXxdbzvU9RkqgYQF2
                                              MD5:89A52362229DAEE0F5ACBFF5C09D1E86
                                              SHA1:6BB83D386C56773EF2248387BCE2EE9445091C94
                                              SHA-256:F8D462B3F48B5587D13FD2AF9B8675888368611EC0417B03102410CFF3C7B64B
                                              SHA-512:E9C41E6E9D4063AEA28F6A33A538CB32C1E321A03CC7B7D974F1CB30470C3F76EDFAAD2567F5FF4955C0C6F639B940BC6048B75B14866EB87D2FF5428DB96AD5
                                              Malicious:false
                                              Reputation:low
                                              Preview:y..OGOEFEMC1..YH.IO7Z3LB.N4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEF.MC1JX.FV.F.{.M..o`1/<d?7)&?"\d$8&8&;.8Vl0= .0(o...f,"'TjJTBrIO7Z3LB ^.tj>.1i7.3o@.9kk)7pF.MG..0.(.1h>.8.<.Ovd76J8.Ih.%<.?.'tl?1h7.3.X'/u9.7O7Z3LBHN4YFODOEF..*WDGYH..O7.2HB<.4.FODOEFAM.1gFRI_IO.[3L8JN4YFOk.EFA]C1D.XHVI.7Z#LBHL4YCODOEFAMF1DGYHVIOW^3LFHN.bDOFOE.AMS1DWYHVI_7Z#LBHN4YVODOEFAMC1DG.]TI.7Z3L"JN..GODOEFAMC1DGYHVIO7Z3LBHN4Y..EOYFAMC1DGYHVIO7Z3LBHN4YFODOEF.@A1.GYHVIO7Z3LBH.5Y.NDOEFAMC1DGYHVIO7Z3LBHN4YFOj; >5MC1\.XHVYO7Z.MBHJ4YFODOEFAMC1DGyHV)aE>R8#HN.4FOD.DFA#C1D.XHVIO7Z3LBHN4Y.OD.k" 9"1DG.xVIO.X3LTHN4SDODOEFAMC1DGYH.IO.tA?0+N4Y.EOE&CMC.EGYhTIO7Z3LBHN4YFO.OE.AMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1DGYHVIO7Z3LBHN4YFODOEFAMC1
                                              Process:C:\Users\user\AppData\Local\Keily\nonagglutinant.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):288
                                              Entropy (8bit):3.4454391358069363
                                              Encrypted:false
                                              SSDEEP:6:DMM8lfm3OOQdUfclMMlW8g1UEZ+lX1ulLINYsCKlAnriIM8lfQVn:DsO+vNlMkXg1Q1PyvmA2n
                                              MD5:87E8F4F75363D963CAFCFB6A216B45B3
                                              SHA1:3DD733CE5C23F2FB08656BCDAF9A443D8B4429D7
                                              SHA-256:E5FEBCF67ADB88DA68B088DB476645DD6A9F644A7733826C8DC4EDB085A9A1EB
                                              SHA-512:B661D998138AD38F57765FCA7EBEDF4ABDFFB5CA5D08F1458A9B76C53E12E3B420B6581083406FC9E84F36B0D077929DD9B841B3B8085ACD46DADFD2D5536C67
                                              Malicious:true
                                              Reputation:low
                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.K.e.i.l.y.\.n.o.n.a.g.g.l.u.t.i.n.a.n.t...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                              Process:C:\Windows\System32\wbem\WMIADAP.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):357
                                              Entropy (8bit):2.914952004241742
                                              Encrypted:false
                                              SSDEEP:3:RKRKgIj2DDxXoejmKXVM8cv2RcLKdV9zbPUGfyAj9xMOOFOwOyW7AQLMNWc2vsKV:e8G4eBXVclq/UIJc3FNOOTNWdson
                                              MD5:52DF6A809F7BA7A7ABF1252F292B4E25
                                              SHA1:3703531F953FE8B6FE72931BECFCFEC5C146669A
                                              SHA-256:3C5BA44D2CB8993015BCA60B919DE1427E1170BAEF4C531DB12486A92DA536B8
                                              SHA-512:1E848B681930F3B1397175F9AB4C1B1B8B7F53D646A91DFD10B7DCF31DD2CBC790C5F6A7D61E01BFC80ADCF519E15D61334559CB67799F03B4797CFAFBCC1D8E
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////....
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.530445629289875
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:ItPTgiBC07.exe
                                              File size:1'343'097 bytes
                                              MD5:14a18fb3ad6f796e93c8aa1e9c7f34f6
                                              SHA1:9b5cb8fae133d1033816260815061699d54c082a
                                              SHA256:f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f
                                              SHA512:ab1d08792a0aafad461c4b44e7f0f167a5d6a142be7f4497f47a003b8b3e08f76b257fd73a918619a3af969e57b7f56381d086cae91e6111f0699cee0bbbb33b
                                              SSDEEP:24576:uRmJkcoQricOIQxiZY1iaClwbmA2JR50tFQyuiBjXaSg14r9c86O1dPr:7JZoQrbTFZY1iaClVdytG4ZbhKW
                                              TLSH:0955F122F5C69036C1B323B19E7FF7669A3D79360326D19B27C82D315EA05412B2A773
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                              Icon Hash:1733312925935517
                                              Entrypoint:0x4165c1
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:0
                                              File Version Major:5
                                              File Version Minor:0
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:0
                                              Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                              Instruction
                                              call 00007F86F4DB67FBh
                                              jmp 00007F86F4DAD66Eh
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push ebp
                                              mov ebp, esp
                                              push edi
                                              push esi
                                              mov esi, dword ptr [ebp+0Ch]
                                              mov ecx, dword ptr [ebp+10h]
                                              mov edi, dword ptr [ebp+08h]
                                              mov eax, ecx
                                              mov edx, ecx
                                              add eax, esi
                                              cmp edi, esi
                                              jbe 00007F86F4DAD7EAh
                                              cmp edi, eax
                                              jc 00007F86F4DAD986h
                                              cmp ecx, 00000080h
                                              jc 00007F86F4DAD7FEh
                                              cmp dword ptr [004A9724h], 00000000h
                                              je 00007F86F4DAD7F5h
                                              push edi
                                              push esi
                                              and edi, 0Fh
                                              and esi, 0Fh
                                              cmp edi, esi
                                              pop esi
                                              pop edi
                                              jne 00007F86F4DAD7E7h
                                              jmp 00007F86F4DADBC2h
                                              test edi, 00000003h
                                              jne 00007F86F4DAD7F6h
                                              shr ecx, 02h
                                              and edx, 03h
                                              cmp ecx, 08h
                                              jc 00007F86F4DAD80Bh
                                              rep movsd
                                              jmp dword ptr [00416740h+edx*4]
                                              mov eax, edi
                                              mov edx, 00000003h
                                              sub ecx, 04h
                                              jc 00007F86F4DAD7EEh
                                              and eax, 03h
                                              add ecx, eax
                                              jmp dword ptr [00416654h+eax*4]
                                              jmp dword ptr [00416750h+ecx*4]
                                              nop
                                              jmp dword ptr [004166D4h+ecx*4]
                                              nop
                                              inc cx
                                              add byte ptr [eax-4BFFBE9Ah], dl
                                              inc cx
                                              add byte ptr [ebx], ah
                                              ror dword ptr [edx-75F877FAh], 1
                                              inc esi
                                              add dword ptr [eax+468A0147h], ecx
                                              add al, cl
                                              jmp 00007F86F7225FE7h
                                              add esi, 03h
                                              add edi, 03h
                                              cmp ecx, 08h
                                              jc 00007F86F4DAD7AEh
                                              rep movsd
                                              jmp dword ptr [00000000h+edx*4]
                                              Programming Language:
                                              • [ C ] VS2010 SP1 build 40219
                                              • [C++] VS2010 SP1 build 40219
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              • [ASM] VS2010 SP1 build 40219
                                              • [RES] VS2010 SP1 build 40219
                                              • [LNK] VS2010 SP1 build 40219
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                              RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                              RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                              RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                              RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                              RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                              RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                              RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                              RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                              RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                              RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                              RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                              RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                              RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                              RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                              RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                              RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                              RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                              RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                              RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                              DLLImport
                                              WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                              VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                              MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                              PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                              USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                              KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                              USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                              GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                              ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                              ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                              OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 8, 2024 15:53:15.834649086 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:15.834691048 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:15.839577913 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:15.873181105 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:15.873202085 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.346151114 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.346246004 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:16.404206991 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:16.404225111 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.404576063 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.448127985 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:16.532633066 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:16.575397015 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.642170906 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.642239094 CEST44349699172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:16.642294884 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:16.647870064 CEST49699443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:17.184289932 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:17.190810919 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:17.190941095 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.055536985 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.055763006 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.061233997 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.218803883 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.218998909 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.224078894 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.381165028 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.381643057 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.386523008 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545013905 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545042038 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545053005 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545121908 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.545207024 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545219898 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.545259953 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.590481997 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.595683098 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.768762112 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.791408062 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:18.796787024 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:18.958275080 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.001425028 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:19.006422043 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.166783094 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.168169022 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:19.175659895 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.521631956 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.521923065 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:19.538521051 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.686372995 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.686661959 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:19.692109108 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.872874975 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:19.873069048 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:19.880036116 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.040183067 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.040750027 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:20.040921926 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:20.040961027 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:20.040982962 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:20.046403885 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.046416044 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.046577930 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.046588898 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.351424932 CEST58749700198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:20.401262999 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:25.102523088 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.102554083 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.102617025 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.108338118 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.108350992 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.573530912 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.573606968 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.575136900 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.575149059 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.575653076 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.620042086 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.646897078 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.691414118 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.760361910 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.760430098 CEST44349732172.67.74.152192.168.2.7
                                              Oct 8, 2024 15:53:25.760487080 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.763648987 CEST49732443192.168.2.7172.67.74.152
                                              Oct 8, 2024 15:53:25.874612093 CEST49700587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:26.355173111 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:26.360400915 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:26.360488892 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:26.958904982 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:26.959161997 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:26.963911057 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.127336979 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.127532959 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.132757902 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.318253994 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.318691969 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.323718071 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489092112 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489214897 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489228964 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489240885 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489252090 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.489278078 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.489300966 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.490930080 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.496400118 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.660770893 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.666863918 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.672580957 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.874650955 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:27.875065088 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:27.880098104 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.045352936 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.045686960 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.050579071 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.217235088 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.217489004 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.222794056 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.387042999 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.387353897 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.392576933 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.580410957 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.580598116 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.585654974 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.765805960 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.767162085 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.767239094 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.767267942 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.767288923 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:53:28.772087097 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.772239923 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.772254944 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:28.772269964 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:29.149854898 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:53:29.198198080 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:55:06.371212006 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:55:06.376478910 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:55:06.539648056 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:55:06.539772034 CEST58749744198.54.122.135192.168.2.7
                                              Oct 8, 2024 15:55:06.539848089 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:55:06.540170908 CEST49744587192.168.2.7198.54.122.135
                                              Oct 8, 2024 15:55:06.545016050 CEST58749744198.54.122.135192.168.2.7
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 8, 2024 15:53:15.819031954 CEST6542653192.168.2.71.1.1.1
                                              Oct 8, 2024 15:53:15.829159975 CEST53654261.1.1.1192.168.2.7
                                              Oct 8, 2024 15:53:17.174338102 CEST5994853192.168.2.71.1.1.1
                                              Oct 8, 2024 15:53:17.183674097 CEST53599481.1.1.1192.168.2.7
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 8, 2024 15:53:15.819031954 CEST192.168.2.71.1.1.10x8dfaStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                              Oct 8, 2024 15:53:17.174338102 CEST192.168.2.71.1.1.10x9a70Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 8, 2024 15:53:15.829159975 CEST1.1.1.1192.168.2.70x8dfaNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                              Oct 8, 2024 15:53:15.829159975 CEST1.1.1.1192.168.2.70x8dfaNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                              Oct 8, 2024 15:53:15.829159975 CEST1.1.1.1192.168.2.70x8dfaNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                              Oct 8, 2024 15:53:17.183674097 CEST1.1.1.1192.168.2.70x9a70No error (0)mail.privateemail.com198.54.122.135A (IP address)IN (0x0001)false
                                              • api.ipify.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.749699172.67.74.1524436812C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-08 13:53:16 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-10-08 13:53:16 UTC211INHTTP/1.1 200 OK
                                              Date: Tue, 08 Oct 2024 13:53:16 GMT
                                              Content-Type: text/plain
                                              Content-Length: 11
                                              Connection: close
                                              Vary: Origin
                                              CF-Cache-Status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 8cf69dbea955184d-EWR
                                              2024-10-08 13:53:16 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                              Data Ascii: 8.46.123.33


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.749732172.67.74.1524435772C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-08 13:53:25 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-10-08 13:53:25 UTC211INHTTP/1.1 200 OK
                                              Date: Tue, 08 Oct 2024 13:53:25 GMT
                                              Content-Type: text/plain
                                              Content-Length: 11
                                              Connection: close
                                              Vary: Origin
                                              CF-Cache-Status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 8cf69df7ac4e422d-EWR
                                              2024-10-08 13:53:25 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                              Data Ascii: 8.46.123.33


                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Oct 8, 2024 15:53:18.055536985 CEST58749700198.54.122.135192.168.2.7220 PrivateEmail.com prod Mail Node
                                              Oct 8, 2024 15:53:18.055763006 CEST49700587192.168.2.7198.54.122.135EHLO 960781
                                              Oct 8, 2024 15:53:18.218803883 CEST58749700198.54.122.135192.168.2.7250-mta-09.privateemail.com
                                              250-PIPELINING
                                              250-SIZE 81788928
                                              250-ETRN
                                              250-AUTH PLAIN LOGIN
                                              250-ENHANCEDSTATUSCODES
                                              250-8BITMIME
                                              250-CHUNKING
                                              250 STARTTLS
                                              Oct 8, 2024 15:53:18.218998909 CEST49700587192.168.2.7198.54.122.135STARTTLS
                                              Oct 8, 2024 15:53:18.381165028 CEST58749700198.54.122.135192.168.2.7220 Ready to start TLS
                                              Oct 8, 2024 15:53:26.958904982 CEST58749744198.54.122.135192.168.2.7220 PrivateEmail.com prod Mail Node
                                              Oct 8, 2024 15:53:26.959161997 CEST49744587192.168.2.7198.54.122.135EHLO 960781
                                              Oct 8, 2024 15:53:27.127336979 CEST58749744198.54.122.135192.168.2.7250-mta-09.privateemail.com
                                              250-PIPELINING
                                              250-SIZE 81788928
                                              250-ETRN
                                              250-AUTH PLAIN LOGIN
                                              250-ENHANCEDSTATUSCODES
                                              250-8BITMIME
                                              250-CHUNKING
                                              250 STARTTLS
                                              Oct 8, 2024 15:53:27.127532959 CEST49744587192.168.2.7198.54.122.135STARTTLS
                                              Oct 8, 2024 15:53:27.318253994 CEST58749744198.54.122.135192.168.2.7220 Ready to start TLS

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:4
                                              Start time:09:53:11
                                              Start date:08/10/2024
                                              Path:C:\Users\user\Desktop\ItPTgiBC07.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\ItPTgiBC07.exe"
                                              Imagebase:0x400000
                                              File size:1'343'097 bytes
                                              MD5 hash:14A18FB3AD6F796E93C8AA1E9C7F34F6
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:09:53:12
                                              Start date:08/10/2024
                                              Path:C:\Users\user\AppData\Local\Keily\nonagglutinant.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\ItPTgiBC07.exe"
                                              Imagebase:0x400000
                                              File size:1'343'097 bytes
                                              MD5 hash:14A18FB3AD6F796E93C8AA1E9C7F34F6
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.1293667148.0000000003C00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 76%, ReversingLabs
                                              Reputation:low
                                              Has exited:true

                                              Target ID:9
                                              Start time:09:53:13
                                              Start date:08/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\ItPTgiBC07.exe"
                                              Imagebase:0x1c0000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:10
                                              Start time:09:53:13
                                              Start date:08/10/2024
                                              Path:C:\Users\user\AppData\Local\Keily\nonagglutinant.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                                              Imagebase:0x400000
                                              File size:1'343'097 bytes
                                              MD5 hash:14A18FB3AD6F796E93C8AA1E9C7F34F6
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000A.00000002.1307612305.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:11
                                              Start time:09:53:14
                                              Start date:08/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                                              Imagebase:0xe50000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1404097794.00000000035DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1402317001.0000000002FBF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1405594758.0000000004561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000B.00000002.1403434702.0000000003460000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1404097794.00000000035E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000B.00000002.1399759379.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000B.00000002.1403995411.00000000034F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1404097794.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1404097794.00000000035B4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Target ID:13
                                              Start time:09:53:21
                                              Start date:08/10/2024
                                              Path:C:\Windows\System32\wscript.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonagglutinant.vbs"
                                              Imagebase:0x7ff67b1f0000
                                              File size:170'496 bytes
                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:14
                                              Start time:09:53:22
                                              Start date:08/10/2024
                                              Path:C:\Users\user\AppData\Local\Keily\nonagglutinant.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                                              Imagebase:0x400000
                                              File size:1'343'097 bytes
                                              MD5 hash:14A18FB3AD6F796E93C8AA1E9C7F34F6
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000E.00000002.1399638845.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:15
                                              Start time:09:53:23
                                              Start date:08/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\Keily\nonagglutinant.exe"
                                              Imagebase:0xc70000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2514523591.00000000032FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2514523591.00000000032D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2514523591.00000000032D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Target ID:20
                                              Start time:11:54:33
                                              Start date:08/10/2024
                                              Path:C:\Windows\System32\wbem\WMIADAP.exe
                                              Wow64 process (32bit):false
                                              Commandline:wmiadap.exe /F /T /R
                                              Imagebase:0x7ff7f1910000
                                              File size:182'272 bytes
                                              MD5 hash:1BFFABBD200C850E6346820E92B915DC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:3.1%
                                                Dynamic/Decrypted Code Coverage:0.5%
                                                Signature Coverage:8.9%
                                                Total number of Nodes:1996
                                                Total number of Limit Nodes:36
                                                execution_graph 86104 4010e0 86107 401100 86104->86107 86106 4010f8 86108 401113 86107->86108 86110 401120 86108->86110 86111 401184 86108->86111 86112 40114c 86108->86112 86138 401182 86108->86138 86109 40112c DefWindowProcW 86109->86106 86110->86109 86152 401000 Shell_NotifyIconW __wctomb_s_l 86110->86152 86145 401250 61 API calls __wctomb_s_l 86111->86145 86114 401151 86112->86114 86115 40119d 86112->86115 86119 401219 86114->86119 86120 40115d 86114->86120 86117 4011a3 86115->86117 86118 42afb4 86115->86118 86116 401193 86116->86106 86117->86110 86126 4011b6 KillTimer 86117->86126 86127 4011db SetTimer RegisterWindowMessageW 86117->86127 86147 40f190 10 API calls 86118->86147 86119->86110 86130 401225 86119->86130 86123 401163 86120->86123 86124 42b01d 86120->86124 86128 42afe9 86123->86128 86129 40116c 86123->86129 86124->86109 86151 4370f4 52 API calls 86124->86151 86125 42b04f 86153 40e0c0 86125->86153 86146 401000 Shell_NotifyIconW __wctomb_s_l 86126->86146 86127->86116 86135 401204 CreatePopupMenu 86127->86135 86149 40f190 10 API calls 86128->86149 86129->86110 86137 401174 86129->86137 86163 468b0e 74 API calls __wctomb_s_l 86130->86163 86135->86106 86148 45fd57 65 API calls __wctomb_s_l 86137->86148 86138->86109 86139 42afe4 86139->86116 86140 42b00e 86150 401a50 331 API calls 86140->86150 86141 4011c9 PostQuitMessage 86141->86106 86144 42afdc 86144->86109 86144->86139 86145->86116 86146->86141 86147->86116 86148->86144 86149->86140 86150->86138 86151->86138 86152->86125 86154 40e0e7 __wctomb_s_l 86153->86154 86155 42729f DestroyIcon 86154->86155 86157 40e142 86154->86157 86155->86157 86156 40e184 86159 40e1a0 Shell_NotifyIconW 86156->86159 86160 4272db Shell_NotifyIconW 86156->86160 86157->86156 86186 4341e6 63 API calls __wcsicoll 86157->86186 86164 401b80 86159->86164 86162 40e1ba 86162->86138 86163->86139 86165 401b9c 86164->86165 86185 401c7e 86164->86185 86187 4013c0 86165->86187 86168 42722b LoadStringW 86171 427246 86168->86171 86169 401bb9 86192 402160 86169->86192 86206 40e0a0 86171->86206 86172 401bcd 86174 427258 86172->86174 86175 401bda 86172->86175 86210 40d200 52 API calls 2 library calls 86174->86210 86175->86171 86176 401be4 86175->86176 86205 40d200 52 API calls 2 library calls 86176->86205 86179 427267 86180 42727b 86179->86180 86182 401bf3 _wcscpy __wctomb_s_l _wcsncpy 86179->86182 86211 40d200 52 API calls 2 library calls 86180->86211 86184 401c62 Shell_NotifyIconW 86182->86184 86183 427289 86184->86185 86185->86162 86186->86156 86212 4115d7 86187->86212 86193 426daa 86192->86193 86194 40216b _wcslen 86192->86194 86250 40c600 86193->86250 86197 402180 86194->86197 86198 40219e 86194->86198 86196 426db5 86196->86172 86249 403bd0 52 API calls ctype 86197->86249 86200 4013a0 52 API calls 86198->86200 86202 4021a5 86200->86202 86201 402187 _memmove 86201->86172 86203 426db7 86202->86203 86204 4115d7 52 API calls 86202->86204 86204->86201 86205->86182 86207 40e0b2 86206->86207 86208 40e0a8 86206->86208 86207->86182 86262 403c30 52 API calls _memmove 86208->86262 86210->86179 86211->86183 86214 4115e1 _malloc 86212->86214 86215 4013e4 86214->86215 86218 4115fd std::exception::exception 86214->86218 86226 4135bb 86214->86226 86223 4013a0 86215->86223 86216 41163b 86241 4180af 46 API calls std::exception::operator= 86216->86241 86218->86216 86240 41130a 51 API calls __cinit 86218->86240 86219 411645 86242 418105 RaiseException 86219->86242 86222 411656 86224 4115d7 52 API calls 86223->86224 86225 4013a7 86224->86225 86225->86168 86225->86169 86227 413638 _malloc 86226->86227 86236 4135c9 _malloc 86226->86236 86248 417f77 46 API calls __getptd_noexit 86227->86248 86230 4135f7 RtlAllocateHeap 86230->86236 86239 413630 86230->86239 86232 413624 86246 417f77 46 API calls __getptd_noexit 86232->86246 86235 4135d4 86235->86236 86243 418901 46 API calls __NMSG_WRITE 86235->86243 86244 418752 46 API calls 8 library calls 86235->86244 86245 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86235->86245 86236->86230 86236->86232 86236->86235 86237 413622 86236->86237 86247 417f77 46 API calls __getptd_noexit 86237->86247 86239->86214 86240->86216 86241->86219 86242->86222 86243->86235 86244->86235 86246->86237 86247->86239 86248->86239 86249->86201 86251 40c619 86250->86251 86252 40c60a 86250->86252 86251->86196 86252->86251 86255 4026f0 86252->86255 86254 426d7a _memmove 86254->86196 86256 426873 86255->86256 86257 4026ff 86255->86257 86258 4013a0 52 API calls 86256->86258 86257->86254 86259 42687b 86258->86259 86260 4115d7 52 API calls 86259->86260 86261 42689e _memmove 86260->86261 86261->86254 86262->86207 86263 40bd20 86265 428194 86263->86265 86266 40bd2d 86263->86266 86264 40bd43 86265->86264 86268 4281bc 86265->86268 86271 4281b2 86265->86271 86272 40bd37 86266->86272 86286 4531b1 85 API calls 5 library calls 86266->86286 86285 45e987 86 API calls ctype 86268->86285 86284 40b510 VariantClear 86271->86284 86275 40bd50 86272->86275 86274 4281ba 86276 426cf1 86275->86276 86277 40bd63 86275->86277 86296 44cde9 52 API calls _memmove 86276->86296 86287 40bd80 86277->86287 86280 426cfc 86282 40e0a0 52 API calls 86280->86282 86281 40bd73 86281->86264 86283 426d02 86282->86283 86284->86274 86285->86266 86286->86272 86288 40bd8e 86287->86288 86289 40bdb7 _memmove 86287->86289 86288->86289 86290 40bded 86288->86290 86291 40bdad 86288->86291 86289->86281 86293 4115d7 52 API calls 86290->86293 86297 402f00 86291->86297 86294 40bdf6 86293->86294 86294->86289 86295 4115d7 52 API calls 86294->86295 86295->86289 86296->86280 86298 402f0c 86297->86298 86299 402f10 86297->86299 86298->86289 86300 4115d7 52 API calls 86299->86300 86301 4268c3 86299->86301 86302 402f51 ctype _memmove 86300->86302 86302->86289 86303 425ba2 86308 40e360 86303->86308 86305 425bb4 86324 41130a 51 API calls __cinit 86305->86324 86307 425bbe 86309 4115d7 52 API calls 86308->86309 86310 40e3ec GetModuleFileNameW 86309->86310 86325 413a0e 86310->86325 86312 40e421 _wcsncat 86328 413a9e 86312->86328 86315 4115d7 52 API calls 86316 40e45e _wcscpy 86315->86316 86331 40bc70 86316->86331 86320 40e4a9 86320->86305 86321 401c90 52 API calls 86323 40e4a1 _wcscat _wcslen _wcsncpy 86321->86323 86322 4115d7 52 API calls 86322->86323 86323->86320 86323->86321 86323->86322 86324->86307 86350 413801 86325->86350 86380 419efd 86328->86380 86332 4115d7 52 API calls 86331->86332 86333 40bc98 86332->86333 86334 4115d7 52 API calls 86333->86334 86335 40bca6 86334->86335 86336 40e4c0 86335->86336 86392 403350 86336->86392 86338 40e4cb RegOpenKeyExW 86339 427190 RegQueryValueExW 86338->86339 86340 40e4eb 86338->86340 86341 4271b0 86339->86341 86342 42721a RegCloseKey 86339->86342 86340->86323 86343 4115d7 52 API calls 86341->86343 86342->86323 86344 4271cb 86343->86344 86399 43652f 52 API calls 86344->86399 86346 4271d8 RegQueryValueExW 86347 4271f7 86346->86347 86349 42720e 86346->86349 86348 402160 52 API calls 86347->86348 86348->86349 86349->86342 86351 41389e 86350->86351 86357 41381a 86350->86357 86352 4139e8 86351->86352 86354 413a00 86351->86354 86377 417f77 46 API calls __getptd_noexit 86352->86377 86379 417f77 46 API calls __getptd_noexit 86354->86379 86355 4139ed 86378 417f25 10 API calls __wctomb_s_l 86355->86378 86357->86351 86365 41388a 86357->86365 86372 419e30 46 API calls __wctomb_s_l 86357->86372 86359 413967 86359->86312 86361 41396c 86361->86351 86361->86359 86364 41397a 86361->86364 86362 413929 86362->86351 86363 413945 86362->86363 86374 419e30 46 API calls __wctomb_s_l 86362->86374 86363->86351 86363->86359 86368 41395b 86363->86368 86376 419e30 46 API calls __wctomb_s_l 86364->86376 86365->86351 86371 413909 86365->86371 86373 419e30 46 API calls __wctomb_s_l 86365->86373 86375 419e30 46 API calls __wctomb_s_l 86368->86375 86371->86361 86371->86362 86372->86365 86373->86371 86374->86363 86375->86359 86376->86359 86377->86355 86378->86359 86379->86359 86381 419f13 86380->86381 86382 419f0e 86380->86382 86389 417f77 46 API calls __getptd_noexit 86381->86389 86382->86381 86383 419f2b 86382->86383 86387 40e454 86383->86387 86391 417f77 46 API calls __getptd_noexit 86383->86391 86387->86315 86388 419f18 86390 417f25 10 API calls __wctomb_s_l 86388->86390 86389->86388 86390->86387 86391->86388 86393 403367 86392->86393 86394 403358 86392->86394 86395 4115d7 52 API calls 86393->86395 86394->86338 86396 403370 86395->86396 86397 4115d7 52 API calls 86396->86397 86398 40339e 86397->86398 86398->86338 86399->86346 86400 416454 86437 416c70 86400->86437 86402 416460 GetStartupInfoW 86403 416474 86402->86403 86438 419d5a HeapCreate 86403->86438 86405 4164cd 86406 4164d8 86405->86406 86522 41642b 46 API calls 3 library calls 86405->86522 86439 417c20 GetModuleHandleW 86406->86439 86409 4164de 86410 4164e9 __RTC_Initialize 86409->86410 86523 41642b 46 API calls 3 library calls 86409->86523 86458 41aaa1 GetStartupInfoW 86410->86458 86414 416503 GetCommandLineW 86471 41f584 GetEnvironmentStringsW 86414->86471 86418 416513 86477 41f4d6 GetModuleFileNameW 86418->86477 86420 41651d 86421 416528 86420->86421 86525 411924 46 API calls 3 library calls 86420->86525 86481 41f2a4 86421->86481 86424 41652e 86425 416539 86424->86425 86526 411924 46 API calls 3 library calls 86424->86526 86495 411703 86425->86495 86428 416541 86430 41654c __wwincmdln 86428->86430 86527 411924 46 API calls 3 library calls 86428->86527 86499 40d6b0 86430->86499 86433 41657c 86529 411906 46 API calls _doexit 86433->86529 86436 416581 _raise 86437->86402 86438->86405 86440 417c34 86439->86440 86441 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86439->86441 86530 4178ff 49 API calls _free 86440->86530 86443 417c87 TlsAlloc 86441->86443 86446 417cd5 TlsSetValue 86443->86446 86447 417d96 86443->86447 86444 417c39 86444->86409 86446->86447 86448 417ce6 __init_pointers 86446->86448 86447->86409 86531 418151 InitializeCriticalSectionAndSpinCount 86448->86531 86450 417d91 86539 4178ff 49 API calls _free 86450->86539 86452 417d2a 86452->86450 86532 416b49 86452->86532 86455 417d76 86538 41793c 46 API calls 4 library calls 86455->86538 86457 417d7e GetCurrentThreadId 86457->86447 86459 416b49 __calloc_crt 46 API calls 86458->86459 86460 41aabf 86459->86460 86462 416b49 __calloc_crt 46 API calls 86460->86462 86465 41abb4 86460->86465 86466 4164f7 86460->86466 86467 41ac34 86460->86467 86461 41ac6a GetStdHandle 86461->86467 86462->86460 86463 41acce SetHandleCount 86463->86466 86464 41ac7c GetFileType 86464->86467 86465->86467 86468 41abe0 GetFileType 86465->86468 86469 41abeb InitializeCriticalSectionAndSpinCount 86465->86469 86466->86414 86524 411924 46 API calls 3 library calls 86466->86524 86467->86461 86467->86463 86467->86464 86470 41aca2 InitializeCriticalSectionAndSpinCount 86467->86470 86468->86465 86468->86469 86469->86465 86469->86466 86470->86466 86470->86467 86472 41f595 86471->86472 86473 41f599 86471->86473 86472->86418 86549 416b04 86473->86549 86475 41f5bb _memmove 86476 41f5c2 FreeEnvironmentStringsW 86475->86476 86476->86418 86478 41f50b _wparse_cmdline 86477->86478 86479 416b04 __malloc_crt 46 API calls 86478->86479 86480 41f54e _wparse_cmdline 86478->86480 86479->86480 86480->86420 86482 41f2bc _wcslen 86481->86482 86486 41f2b4 86481->86486 86483 416b49 __calloc_crt 46 API calls 86482->86483 86488 41f2e0 _wcslen 86483->86488 86484 41f336 86556 413748 86484->86556 86486->86424 86487 416b49 __calloc_crt 46 API calls 86487->86488 86488->86484 86488->86486 86488->86487 86489 41f35c 86488->86489 86492 41f373 86488->86492 86555 41ef12 46 API calls __wctomb_s_l 86488->86555 86490 413748 _free 46 API calls 86489->86490 86490->86486 86562 417ed3 86492->86562 86494 41f37f 86494->86424 86496 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86495->86496 86498 411750 __IsNonwritableInCurrentImage 86496->86498 86581 41130a 51 API calls __cinit 86496->86581 86498->86428 86500 42e2f3 86499->86500 86501 40d6cc 86499->86501 86582 408f40 86501->86582 86503 40d707 86586 40ebb0 86503->86586 86506 40d737 86589 411951 86506->86589 86511 40d751 86601 40f4e0 SystemParametersInfoW SystemParametersInfoW 86511->86601 86513 40d75f 86602 40d590 GetCurrentDirectoryW 86513->86602 86515 40d767 SystemParametersInfoW 86516 40d794 86515->86516 86517 40d78d FreeLibrary 86515->86517 86518 408f40 VariantClear 86516->86518 86517->86516 86519 40d79d 86518->86519 86520 408f40 VariantClear 86519->86520 86521 40d7a6 86520->86521 86521->86433 86528 4118da 46 API calls _doexit 86521->86528 86522->86406 86523->86410 86528->86433 86529->86436 86530->86444 86531->86452 86534 416b52 86532->86534 86535 416b8f 86534->86535 86536 416b70 Sleep 86534->86536 86540 41f677 86534->86540 86535->86450 86535->86455 86537 416b85 86536->86537 86537->86534 86537->86535 86538->86457 86539->86447 86541 41f683 86540->86541 86542 41f69e _malloc 86540->86542 86541->86542 86543 41f68f 86541->86543 86544 41f6b1 HeapAlloc 86542->86544 86547 41f6d8 86542->86547 86548 417f77 46 API calls __getptd_noexit 86543->86548 86544->86542 86544->86547 86546 41f694 86546->86534 86547->86534 86548->86546 86552 416b0d 86549->86552 86550 4135bb _malloc 45 API calls 86550->86552 86551 416b43 86551->86475 86552->86550 86552->86551 86553 416b24 Sleep 86552->86553 86554 416b39 86553->86554 86554->86551 86554->86552 86555->86488 86557 41377c _free 86556->86557 86558 413753 RtlFreeHeap 86556->86558 86557->86486 86558->86557 86559 413768 86558->86559 86565 417f77 46 API calls __getptd_noexit 86559->86565 86561 41376e GetLastError 86561->86557 86566 417daa 86562->86566 86565->86561 86567 417dc9 __wctomb_s_l __call_reportfault 86566->86567 86568 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86567->86568 86569 417eb5 __call_reportfault 86568->86569 86572 41a208 86569->86572 86571 417ed1 GetCurrentProcess TerminateProcess 86571->86494 86573 41a210 86572->86573 86574 41a212 IsDebuggerPresent 86572->86574 86573->86571 86580 41fe19 86574->86580 86577 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86578 421ff8 GetCurrentProcess TerminateProcess 86577->86578 86579 421ff0 __call_reportfault 86577->86579 86578->86571 86579->86578 86580->86577 86581->86498 86583 408f48 ctype 86582->86583 86584 4265c7 VariantClear 86583->86584 86585 408f55 ctype 86583->86585 86584->86585 86585->86503 86642 40ebd0 86586->86642 86646 4182cb 86589->86646 86591 41195e 86653 4181f2 LeaveCriticalSection 86591->86653 86593 40d748 86594 4119b0 86593->86594 86595 4119d6 86594->86595 86596 4119bc 86594->86596 86595->86511 86596->86595 86688 417f77 46 API calls __getptd_noexit 86596->86688 86598 4119c6 86689 417f25 10 API calls __wctomb_s_l 86598->86689 86600 4119d1 86600->86511 86601->86513 86690 401f20 86602->86690 86604 40d5b6 IsDebuggerPresent 86605 40d5c4 86604->86605 86606 42e1bb MessageBoxA 86604->86606 86607 42e1d4 86605->86607 86608 40d5e3 86605->86608 86606->86607 86862 403a50 52 API calls 3 library calls 86607->86862 86760 40f520 86608->86760 86612 40d5fd GetFullPathNameW 86772 401460 86612->86772 86614 40d63b 86615 40d643 86614->86615 86616 42e231 SetCurrentDirectoryW 86614->86616 86617 40d64c 86615->86617 86863 432fee 6 API calls 86615->86863 86616->86615 86787 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86617->86787 86621 42e252 86621->86617 86623 42e25a GetModuleFileNameW 86621->86623 86624 42e274 86623->86624 86625 42e2cb GetForegroundWindow ShellExecuteW 86623->86625 86864 401b10 86624->86864 86629 40d688 86625->86629 86626 40d656 86628 40d669 86626->86628 86631 40e0c0 74 API calls 86626->86631 86795 4091e0 86628->86795 86635 40d692 SetCurrentDirectoryW 86629->86635 86631->86628 86635->86515 86636 42e28d 86871 40d200 52 API calls 2 library calls 86636->86871 86639 42e299 GetForegroundWindow ShellExecuteW 86640 42e2c6 86639->86640 86640->86629 86641 40ec00 LoadLibraryA GetProcAddress 86641->86506 86643 40d72e 86642->86643 86644 40ebd6 LoadLibraryA 86642->86644 86643->86506 86643->86641 86644->86643 86645 40ebe7 GetProcAddress 86644->86645 86645->86643 86647 4182e0 86646->86647 86648 4182f3 EnterCriticalSection 86646->86648 86654 418209 86647->86654 86648->86591 86650 4182e6 86650->86648 86681 411924 46 API calls 3 library calls 86650->86681 86653->86593 86655 418215 _raise 86654->86655 86656 418225 86655->86656 86657 41823d 86655->86657 86682 418901 46 API calls __NMSG_WRITE 86656->86682 86659 416b04 __malloc_crt 45 API calls 86657->86659 86666 41824b _raise 86657->86666 86661 418256 86659->86661 86660 41822a 86683 418752 46 API calls 8 library calls 86660->86683 86664 41825d 86661->86664 86665 41826c 86661->86665 86663 418231 86684 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86663->86684 86685 417f77 46 API calls __getptd_noexit 86664->86685 86669 4182cb __lock 45 API calls 86665->86669 86666->86650 86671 418273 86669->86671 86672 4182a6 86671->86672 86673 41827b InitializeCriticalSectionAndSpinCount 86671->86673 86674 413748 _free 45 API calls 86672->86674 86675 418297 86673->86675 86676 41828b 86673->86676 86674->86675 86687 4182c2 LeaveCriticalSection _doexit 86675->86687 86677 413748 _free 45 API calls 86676->86677 86678 418291 86677->86678 86686 417f77 46 API calls __getptd_noexit 86678->86686 86682->86660 86683->86663 86685->86666 86686->86675 86687->86666 86688->86598 86689->86600 86872 40e6e0 86690->86872 86694 401f41 GetModuleFileNameW 86890 410100 86694->86890 86696 401f5c 86902 410960 86696->86902 86699 401b10 52 API calls 86700 401f81 86699->86700 86905 401980 86700->86905 86702 401f8e 86703 408f40 VariantClear 86702->86703 86704 401f9d 86703->86704 86705 401b10 52 API calls 86704->86705 86706 401fb4 86705->86706 86707 401980 53 API calls 86706->86707 86708 401fc3 86707->86708 86709 401b10 52 API calls 86708->86709 86710 401fd2 86709->86710 86913 40c2c0 86710->86913 86712 401fe1 86713 40bc70 52 API calls 86712->86713 86714 401ff3 86713->86714 86931 401a10 86714->86931 86716 401ffe 86938 4114ab 86716->86938 86719 428b05 86721 401a10 52 API calls 86719->86721 86720 402017 86722 4114ab __wcsicoll 58 API calls 86720->86722 86723 428b18 86721->86723 86724 402022 86722->86724 86726 401a10 52 API calls 86723->86726 86724->86723 86725 40202d 86724->86725 86727 4114ab __wcsicoll 58 API calls 86725->86727 86728 428b33 86726->86728 86729 402038 86727->86729 86731 428b3b GetModuleFileNameW 86728->86731 86730 402043 86729->86730 86729->86731 86732 4114ab __wcsicoll 58 API calls 86730->86732 86733 401a10 52 API calls 86731->86733 86734 40204e 86732->86734 86735 428b6c 86733->86735 86737 428b90 _wcscpy 86734->86737 86740 401a10 52 API calls 86734->86740 86752 402092 86734->86752 86736 40e0a0 52 API calls 86735->86736 86738 428b7a 86736->86738 86746 401a10 52 API calls 86737->86746 86741 401a10 52 API calls 86738->86741 86739 4020a3 86742 428bc6 86739->86742 86946 40e830 53 API calls 86739->86946 86745 402073 _wcscpy 86740->86745 86743 428b88 86741->86743 86743->86737 86750 401a10 52 API calls 86745->86750 86755 4020d0 86746->86755 86747 4020bb 86947 40cf00 53 API calls 86747->86947 86749 4020c6 86751 408f40 VariantClear 86749->86751 86750->86752 86751->86755 86752->86737 86752->86739 86753 402110 86757 408f40 VariantClear 86753->86757 86755->86753 86758 401a10 52 API calls 86755->86758 86948 40cf00 53 API calls 86755->86948 86949 40e6a0 53 API calls 86755->86949 86759 402120 ctype 86757->86759 86758->86755 86759->86604 86761 4295c9 __wctomb_s_l 86760->86761 86762 40f53c 86760->86762 86765 4295d9 GetOpenFileNameW 86761->86765 87628 410120 86762->87628 86764 40f545 87632 4102b0 SHGetMalloc 86764->87632 86765->86762 86768 40d5f5 86765->86768 86767 40f54c 87637 410190 GetFullPathNameW 86767->87637 86768->86612 86768->86614 86770 40f559 87648 40f570 86770->87648 87704 402400 86772->87704 86774 40146f 86777 428c29 _wcscat 86774->86777 87713 401500 86774->87713 86776 40147c 86776->86777 87721 40d440 86776->87721 86779 401489 86779->86777 86780 401491 GetFullPathNameW 86779->86780 86781 402160 52 API calls 86780->86781 86782 4014bb 86781->86782 86783 402160 52 API calls 86782->86783 86784 4014c8 86783->86784 86784->86777 86785 402160 52 API calls 86784->86785 86786 4014ee 86785->86786 86786->86614 86788 428361 86787->86788 86789 4103fc LoadImageW RegisterClassExW 86787->86789 87741 44395e EnumResourceNamesW LoadImageW 86788->87741 87740 410490 7 API calls 86789->87740 86792 40d651 86794 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86792->86794 86793 428368 86794->86626 86796 409202 86795->86796 86797 42d7ad 86795->86797 86852 409216 ctype 86796->86852 88004 410940 331 API calls 86796->88004 88007 45e737 90 API calls 3 library calls 86797->88007 86800 409386 86801 40939c 86800->86801 88005 40f190 10 API calls 86800->88005 86801->86629 86861 401000 Shell_NotifyIconW __wctomb_s_l 86801->86861 86803 4095b2 86803->86801 86804 4095bf 86803->86804 88006 401a50 331 API calls 86804->88006 86805 409253 PeekMessageW 86805->86852 86807 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86807->86801 86809 4095f9 86807->86809 86808 42d8cd Sleep 86808->86852 86813 42e158 TranslateMessage DispatchMessageW GetMessageW 86809->86813 86811 42e13b 88025 40d410 VariantClear 86811->88025 86813->86813 86816 42e188 86813->86816 86815 409567 PeekMessageW 86815->86852 86816->86801 86819 44c29d 52 API calls 86860 4094e0 86819->86860 86820 46f3c1 107 API calls 86820->86852 86821 40e0a0 52 API calls 86821->86852 86822 46fdbf 108 API calls 86822->86860 86823 409551 TranslateMessage DispatchMessageW 86823->86815 86825 42dcd2 WaitForSingleObject 86827 42dcf0 GetExitCodeProcess CloseHandle 86825->86827 86825->86852 86826 42dd3d Sleep 86826->86860 88014 40d410 VariantClear 86827->88014 86831 4094cf Sleep 86831->86860 86833 40d410 VariantClear 86833->86852 86835 42d94d timeGetTime 88010 465124 53 API calls 86835->88010 86836 40c620 timeGetTime 86836->86860 86839 465124 53 API calls 86839->86860 86840 42dd89 CloseHandle 86840->86860 86841 47d33e 309 API calls 86841->86852 86843 42de19 GetExitCodeProcess CloseHandle 86843->86860 86846 42de88 Sleep 86846->86852 86851 45e737 90 API calls 86851->86852 86852->86800 86852->86805 86852->86808 86852->86811 86852->86815 86852->86820 86852->86821 86852->86823 86852->86825 86852->86826 86852->86831 86852->86833 86852->86835 86852->86841 86852->86851 86853 42e0cc VariantClear 86852->86853 86854 408f40 VariantClear 86852->86854 86852->86860 87742 4091b0 86852->87742 87800 40afa0 86852->87800 87826 408fc0 86852->87826 87861 408cc0 86852->87861 87875 4096a0 86852->87875 88002 40d150 TranslateAcceleratorW 86852->88002 88003 40d170 IsDialogMessageW GetClassLongW 86852->88003 88008 465124 53 API calls 86852->88008 88009 40c620 timeGetTime 86852->88009 88024 40e270 VariantClear ctype 86852->88024 86853->86852 86854->86852 86855 401b10 52 API calls 86855->86860 86857 401980 53 API calls 86857->86860 86858 408f40 VariantClear 86858->86860 86860->86819 86860->86822 86860->86836 86860->86839 86860->86840 86860->86843 86860->86846 86860->86852 86860->86855 86860->86857 86860->86858 88011 45178a 54 API calls 86860->88011 88012 47d33e 331 API calls 86860->88012 88013 453bc6 54 API calls 86860->88013 88015 40d410 VariantClear 86860->88015 88016 443d19 67 API calls _wcslen 86860->88016 88017 4574b4 VariantClear 86860->88017 88018 403cd0 86860->88018 88022 4731e1 VariantClear 86860->88022 88023 4331a2 6 API calls 86860->88023 86861->86629 86862->86614 86863->86621 86865 401b16 _wcslen 86864->86865 86866 4115d7 52 API calls 86865->86866 86867 401b63 86865->86867 86868 401b4b _memmove 86866->86868 86870 40d200 52 API calls 2 library calls 86867->86870 86869 4115d7 52 API calls 86868->86869 86869->86867 86870->86636 86871->86639 86873 40bc70 52 API calls 86872->86873 86874 401f31 86873->86874 86875 402560 86874->86875 86876 40256d __write_nolock 86875->86876 86877 402160 52 API calls 86876->86877 86879 402593 86877->86879 86889 4025bd 86879->86889 86950 401c90 86879->86950 86880 4026f0 52 API calls 86880->86889 86881 4026a7 86882 401b10 52 API calls 86881->86882 86888 4026db 86881->86888 86884 4026d1 86882->86884 86883 401b10 52 API calls 86883->86889 86954 40d7c0 52 API calls 2 library calls 86884->86954 86886 401c90 52 API calls 86886->86889 86888->86694 86889->86880 86889->86881 86889->86883 86889->86886 86953 40d7c0 52 API calls 2 library calls 86889->86953 86955 40f760 86890->86955 86893 410118 86893->86696 86895 42805d 86896 42806a 86895->86896 87011 431e58 86895->87011 86898 413748 _free 46 API calls 86896->86898 86899 428078 86898->86899 86900 431e58 82 API calls 86899->86900 86901 428084 86900->86901 86901->86696 86903 4115d7 52 API calls 86902->86903 86904 401f74 86903->86904 86904->86699 86906 4019a3 86905->86906 86909 401985 86905->86909 86907 4019b8 86906->86907 86906->86909 87617 403e10 53 API calls 86907->87617 86908 40199f 86908->86702 86909->86908 87616 403e10 53 API calls 86909->87616 86912 4019c4 86912->86702 86914 40c2c7 86913->86914 86915 40c30e 86913->86915 86916 40c2d3 86914->86916 86917 426c79 86914->86917 86918 40c315 86915->86918 86919 426c2b 86915->86919 87618 403ea0 52 API calls __cinit 86916->87618 87623 4534e3 52 API calls 86917->87623 86923 40c321 86918->86923 86924 426c5a 86918->86924 86921 426c4b 86919->86921 86922 426c2e 86919->86922 87621 4534e3 52 API calls 86921->87621 86930 40c2de 86922->86930 87620 4534e3 52 API calls 86922->87620 87619 403ea0 52 API calls __cinit 86923->87619 87622 4534e3 52 API calls 86924->87622 86930->86712 86932 401a30 86931->86932 86933 401a17 86931->86933 86935 402160 52 API calls 86932->86935 86934 401a2d 86933->86934 87624 403c30 52 API calls _memmove 86933->87624 86934->86716 86937 401a3d 86935->86937 86937->86716 86939 411523 86938->86939 86940 4114ba 86938->86940 87627 4113a8 58 API calls 3 library calls 86939->87627 86944 40200c 86940->86944 87625 417f77 46 API calls __getptd_noexit 86940->87625 86943 4114c6 87626 417f25 10 API calls __wctomb_s_l 86943->87626 86944->86719 86944->86720 86946->86747 86947->86749 86948->86755 86949->86755 86951 4026f0 52 API calls 86950->86951 86952 401c97 86951->86952 86952->86879 86953->86889 86954->86888 87015 40f6f0 86955->87015 86957 40f77b _strcat ctype 87023 40f850 86957->87023 86962 427c2a 87052 414d04 86962->87052 86964 40f7fc 86964->86962 86965 40f804 86964->86965 87039 414a46 86965->87039 86969 40f80e 86969->86893 86974 4528bd 86969->86974 86971 427c59 87058 414fe2 86971->87058 86973 427c79 86975 4150d1 _fseek 81 API calls 86974->86975 86976 452930 86975->86976 87558 452719 86976->87558 86979 452948 86979->86895 86980 414d04 __fread_nolock 61 API calls 86981 452966 86980->86981 86982 414d04 __fread_nolock 61 API calls 86981->86982 86983 452976 86982->86983 86984 414d04 __fread_nolock 61 API calls 86983->86984 86985 45298f 86984->86985 86986 414d04 __fread_nolock 61 API calls 86985->86986 86987 4529aa 86986->86987 86988 4150d1 _fseek 81 API calls 86987->86988 86989 4529c4 86988->86989 86990 4135bb _malloc 46 API calls 86989->86990 86991 4529cf 86990->86991 86992 4135bb _malloc 46 API calls 86991->86992 86993 4529db 86992->86993 86994 414d04 __fread_nolock 61 API calls 86993->86994 86995 4529ec 86994->86995 86996 44afef GetSystemTimeAsFileTime 86995->86996 86997 452a00 86996->86997 86998 452a36 86997->86998 86999 452a13 86997->86999 87001 452aa5 86998->87001 87002 452a3c 86998->87002 87000 413748 _free 46 API calls 86999->87000 87003 452a1c 87000->87003 87005 413748 _free 46 API calls 87001->87005 87564 44b1a9 87002->87564 87007 413748 _free 46 API calls 87003->87007 87006 452aa3 87005->87006 87006->86895 87009 452a25 87007->87009 87008 452a9d 87010 413748 _free 46 API calls 87008->87010 87009->86895 87010->87006 87012 431e64 87011->87012 87013 431e6a 87011->87013 87014 414a46 __fcloseall 82 API calls 87012->87014 87013->86896 87014->87013 87016 425de2 87015->87016 87017 40f6fc _wcslen 87015->87017 87016->86957 87018 40f710 WideCharToMultiByte 87017->87018 87019 40f756 87018->87019 87020 40f728 87018->87020 87019->86957 87021 4115d7 52 API calls 87020->87021 87022 40f735 WideCharToMultiByte 87021->87022 87022->86957 87025 40f85d __wctomb_s_l _strlen 87023->87025 87026 40f7ab 87025->87026 87071 414db8 87025->87071 87027 4149c2 87026->87027 87086 414904 87027->87086 87029 40f7e9 87029->86962 87030 40f5c0 87029->87030 87034 40f5cd _strcat __write_nolock _memmove 87030->87034 87031 414d04 __fread_nolock 61 API calls 87031->87034 87032 40f691 __tzset_nolock 87032->86964 87034->87031 87034->87032 87036 425d11 87034->87036 87174 4150d1 87034->87174 87035 4150d1 _fseek 81 API calls 87037 425d33 87035->87037 87036->87035 87038 414d04 __fread_nolock 61 API calls 87037->87038 87038->87032 87040 414a52 _raise 87039->87040 87041 414a64 87040->87041 87042 414a79 87040->87042 87314 417f77 46 API calls __getptd_noexit 87041->87314 87045 415471 __lock_file 47 API calls 87042->87045 87047 414a74 _raise 87042->87047 87044 414a69 87315 417f25 10 API calls __wctomb_s_l 87044->87315 87048 414a92 87045->87048 87047->86969 87298 4149d9 87048->87298 87383 414c76 87052->87383 87054 414d1c 87055 44afef 87054->87055 87551 442c5a 87055->87551 87057 44b00d 87057->86971 87059 414fee _raise 87058->87059 87060 414ffa 87059->87060 87061 41500f 87059->87061 87555 417f77 46 API calls __getptd_noexit 87060->87555 87063 415471 __lock_file 47 API calls 87061->87063 87065 415017 87063->87065 87064 414fff 87556 417f25 10 API calls __wctomb_s_l 87064->87556 87067 414e4e __ftell_nolock 51 API calls 87065->87067 87069 415024 87067->87069 87068 41500a _raise 87068->86973 87557 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87069->87557 87072 414dd6 87071->87072 87073 414deb 87071->87073 87082 417f77 46 API calls __getptd_noexit 87072->87082 87073->87072 87075 414df2 87073->87075 87084 41b91b 79 API calls 11 library calls 87075->87084 87076 414ddb 87083 417f25 10 API calls __wctomb_s_l 87076->87083 87079 414e18 87081 414de6 87079->87081 87085 418f98 77 API calls 7 library calls 87079->87085 87081->87025 87082->87076 87083->87081 87084->87079 87085->87081 87089 414910 _raise 87086->87089 87087 414923 87142 417f77 46 API calls __getptd_noexit 87087->87142 87089->87087 87091 414951 87089->87091 87090 414928 87143 417f25 10 API calls __wctomb_s_l 87090->87143 87105 41d4d1 87091->87105 87094 414956 87095 41496a 87094->87095 87096 41495d 87094->87096 87098 414992 87095->87098 87099 414972 87095->87099 87144 417f77 46 API calls __getptd_noexit 87096->87144 87122 41d218 87098->87122 87145 417f77 46 API calls __getptd_noexit 87099->87145 87104 414933 _raise @_EH4_CallFilterFunc@8 87104->87029 87106 41d4dd _raise 87105->87106 87107 4182cb __lock 46 API calls 87106->87107 87120 41d4eb 87107->87120 87108 41d560 87147 41d5fb 87108->87147 87109 41d567 87110 416b04 __malloc_crt 46 API calls 87109->87110 87112 41d56e 87110->87112 87112->87108 87114 41d57c InitializeCriticalSectionAndSpinCount 87112->87114 87113 41d5f0 _raise 87113->87094 87115 41d59c 87114->87115 87116 41d5af EnterCriticalSection 87114->87116 87119 413748 _free 46 API calls 87115->87119 87116->87108 87117 418209 __mtinitlocknum 46 API calls 87117->87120 87119->87108 87120->87108 87120->87109 87120->87117 87150 4154b2 47 API calls __lock 87120->87150 87151 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87120->87151 87123 41d23a 87122->87123 87124 41d255 87123->87124 87136 41d26c __wopenfile 87123->87136 87156 417f77 46 API calls __getptd_noexit 87124->87156 87126 41d421 87129 41d47a 87126->87129 87130 41d48c 87126->87130 87127 41d25a 87157 417f25 10 API calls __wctomb_s_l 87127->87157 87161 417f77 46 API calls __getptd_noexit 87129->87161 87153 422bf9 87130->87153 87133 41499d 87146 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87133->87146 87134 41d47f 87162 417f25 10 API calls __wctomb_s_l 87134->87162 87136->87126 87136->87129 87136->87136 87158 41341f 58 API calls 2 library calls 87136->87158 87138 41d41a 87138->87126 87159 41341f 58 API calls 2 library calls 87138->87159 87140 41d439 87140->87126 87160 41341f 58 API calls 2 library calls 87140->87160 87142->87090 87143->87104 87144->87104 87145->87104 87146->87104 87152 4181f2 LeaveCriticalSection 87147->87152 87149 41d602 87149->87113 87150->87120 87151->87120 87152->87149 87163 422b35 87153->87163 87155 422c14 87155->87133 87156->87127 87157->87133 87158->87138 87159->87140 87160->87126 87161->87134 87162->87133 87164 422b41 _raise 87163->87164 87165 422b54 87164->87165 87168 422b8a 87164->87168 87166 417f77 __wctomb_s_l 46 API calls 87165->87166 87167 422b59 87166->87167 87170 417f25 __wctomb_s_l 10 API calls 87167->87170 87169 422400 __tsopen_nolock 109 API calls 87168->87169 87171 422ba4 87169->87171 87173 422b63 _raise 87170->87173 87172 422bcb __wsopen_helper LeaveCriticalSection 87171->87172 87172->87173 87173->87155 87177 4150dd _raise 87174->87177 87175 4150e9 87205 417f77 46 API calls __getptd_noexit 87175->87205 87177->87175 87178 41510f 87177->87178 87187 415471 87178->87187 87179 4150ee 87206 417f25 10 API calls __wctomb_s_l 87179->87206 87186 4150f9 _raise 87186->87034 87188 415483 87187->87188 87189 4154a5 EnterCriticalSection 87187->87189 87188->87189 87191 41548b 87188->87191 87190 415117 87189->87190 87193 415047 87190->87193 87192 4182cb __lock 46 API calls 87191->87192 87192->87190 87194 415067 87193->87194 87195 415057 87193->87195 87200 415079 87194->87200 87208 414e4e 87194->87208 87263 417f77 46 API calls __getptd_noexit 87195->87263 87199 41505c 87207 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87199->87207 87225 41443c 87200->87225 87203 4150b9 87238 41e1f4 87203->87238 87205->87179 87206->87186 87207->87186 87209 414e61 87208->87209 87210 414e79 87208->87210 87264 417f77 46 API calls __getptd_noexit 87209->87264 87211 414139 __filbuf 46 API calls 87210->87211 87214 414e80 87211->87214 87213 414e66 87265 417f25 10 API calls __wctomb_s_l 87213->87265 87216 41e1f4 __write 51 API calls 87214->87216 87217 414e97 87216->87217 87218 414f09 87217->87218 87220 414ec9 87217->87220 87224 414e71 87217->87224 87266 417f77 46 API calls __getptd_noexit 87218->87266 87221 41e1f4 __write 51 API calls 87220->87221 87220->87224 87222 414f64 87221->87222 87223 41e1f4 __write 51 API calls 87222->87223 87222->87224 87223->87224 87224->87200 87226 414455 87225->87226 87230 414477 87225->87230 87227 414139 __filbuf 46 API calls 87226->87227 87226->87230 87228 414470 87227->87228 87267 41b7b2 77 API calls 6 library calls 87228->87267 87231 414139 87230->87231 87232 414145 87231->87232 87233 41415a 87231->87233 87268 417f77 46 API calls __getptd_noexit 87232->87268 87233->87203 87235 41414a 87269 417f25 10 API calls __wctomb_s_l 87235->87269 87237 414155 87237->87203 87239 41e200 _raise 87238->87239 87240 41e223 87239->87240 87241 41e208 87239->87241 87242 41e22f 87240->87242 87248 41e269 87240->87248 87290 417f8a 46 API calls __getptd_noexit 87241->87290 87292 417f8a 46 API calls __getptd_noexit 87242->87292 87245 41e20d 87291 417f77 46 API calls __getptd_noexit 87245->87291 87247 41e234 87293 417f77 46 API calls __getptd_noexit 87247->87293 87270 41ae56 87248->87270 87251 41e23c 87294 417f25 10 API calls __wctomb_s_l 87251->87294 87252 41e26f 87253 41e291 87252->87253 87254 41e27d 87252->87254 87295 417f77 46 API calls __getptd_noexit 87253->87295 87280 41e17f 87254->87280 87258 41e289 87297 41e2c0 LeaveCriticalSection __unlock_fhandle 87258->87297 87259 41e296 87296 417f8a 46 API calls __getptd_noexit 87259->87296 87260 41e215 _raise 87260->87199 87263->87199 87264->87213 87265->87224 87266->87224 87267->87230 87268->87235 87269->87237 87271 41ae62 _raise 87270->87271 87272 41aebc 87271->87272 87273 4182cb __lock 46 API calls 87271->87273 87274 41aec1 EnterCriticalSection 87272->87274 87277 41aede _raise 87272->87277 87275 41ae8e 87273->87275 87274->87277 87276 41ae97 InitializeCriticalSectionAndSpinCount 87275->87276 87278 41aeaa 87275->87278 87276->87278 87277->87252 87279 41aeec ___lock_fhandle LeaveCriticalSection 87278->87279 87279->87272 87281 41aded __close_nolock 46 API calls 87280->87281 87282 41e18e 87281->87282 87283 41e1a4 SetFilePointer 87282->87283 87284 41e194 87282->87284 87286 41e1c3 87283->87286 87287 41e1bb GetLastError 87283->87287 87285 417f77 __wctomb_s_l 46 API calls 87284->87285 87288 41e199 87285->87288 87286->87288 87289 417f9d __dosmaperr 46 API calls 87286->87289 87287->87286 87288->87258 87289->87288 87290->87245 87291->87260 87292->87247 87293->87251 87294->87260 87295->87259 87296->87258 87297->87260 87299 4149ea 87298->87299 87300 4149fe 87298->87300 87344 417f77 46 API calls __getptd_noexit 87299->87344 87302 4149fa 87300->87302 87304 41443c __flush 77 API calls 87300->87304 87316 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87302->87316 87303 4149ef 87345 417f25 10 API calls __wctomb_s_l 87303->87345 87306 414a0a 87304->87306 87317 41d8c2 87306->87317 87309 414139 __filbuf 46 API calls 87310 414a18 87309->87310 87321 41d7fe 87310->87321 87312 414a1e 87312->87302 87313 413748 _free 46 API calls 87312->87313 87313->87302 87314->87044 87315->87047 87316->87047 87318 414a12 87317->87318 87319 41d8d2 87317->87319 87318->87309 87319->87318 87320 413748 _free 46 API calls 87319->87320 87320->87318 87322 41d80a _raise 87321->87322 87323 41d812 87322->87323 87324 41d82d 87322->87324 87361 417f8a 46 API calls __getptd_noexit 87323->87361 87326 41d839 87324->87326 87329 41d873 87324->87329 87363 417f8a 46 API calls __getptd_noexit 87326->87363 87327 41d817 87362 417f77 46 API calls __getptd_noexit 87327->87362 87332 41ae56 ___lock_fhandle 48 API calls 87329->87332 87331 41d83e 87364 417f77 46 API calls __getptd_noexit 87331->87364 87334 41d879 87332->87334 87336 41d893 87334->87336 87337 41d887 87334->87337 87335 41d846 87365 417f25 10 API calls __wctomb_s_l 87335->87365 87366 417f77 46 API calls __getptd_noexit 87336->87366 87346 41d762 87337->87346 87341 41d81f _raise 87341->87312 87342 41d88d 87367 41d8ba LeaveCriticalSection __unlock_fhandle 87342->87367 87344->87303 87345->87302 87368 41aded 87346->87368 87348 41d7c8 87381 41ad67 47 API calls 2 library calls 87348->87381 87350 41d772 87350->87348 87351 41d7a6 87350->87351 87353 41aded __close_nolock 46 API calls 87350->87353 87351->87348 87354 41aded __close_nolock 46 API calls 87351->87354 87352 41d7d0 87356 41d7f2 87352->87356 87382 417f9d 46 API calls 3 library calls 87352->87382 87357 41d79d 87353->87357 87355 41d7b2 CloseHandle 87354->87355 87355->87348 87358 41d7be GetLastError 87355->87358 87356->87342 87360 41aded __close_nolock 46 API calls 87357->87360 87358->87348 87360->87351 87361->87327 87362->87341 87363->87331 87364->87335 87365->87341 87366->87342 87367->87341 87369 41ae12 87368->87369 87370 41adfa 87368->87370 87373 417f8a __set_osfhnd 46 API calls 87369->87373 87375 41ae51 87369->87375 87371 417f8a __set_osfhnd 46 API calls 87370->87371 87372 41adff 87371->87372 87376 417f77 __wctomb_s_l 46 API calls 87372->87376 87374 41ae23 87373->87374 87377 417f77 __wctomb_s_l 46 API calls 87374->87377 87375->87350 87378 41ae07 87376->87378 87379 41ae2b 87377->87379 87378->87350 87380 417f25 __wctomb_s_l 10 API calls 87379->87380 87380->87378 87381->87352 87382->87356 87384 414c82 _raise 87383->87384 87385 414cc3 87384->87385 87386 414c96 __wctomb_s_l 87384->87386 87387 414cbb _raise 87384->87387 87388 415471 __lock_file 47 API calls 87385->87388 87410 417f77 46 API calls __getptd_noexit 87386->87410 87387->87054 87389 414ccb 87388->87389 87396 414aba 87389->87396 87392 414cb0 87411 417f25 10 API calls __wctomb_s_l 87392->87411 87400 414ad8 __wctomb_s_l 87396->87400 87402 414af2 87396->87402 87397 414ae2 87463 417f77 46 API calls __getptd_noexit 87397->87463 87399 414ae7 87464 417f25 10 API calls __wctomb_s_l 87399->87464 87400->87397 87400->87402 87407 414b2d 87400->87407 87412 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87402->87412 87404 414c38 __wctomb_s_l 87466 417f77 46 API calls __getptd_noexit 87404->87466 87405 414139 __filbuf 46 API calls 87405->87407 87407->87402 87407->87404 87407->87405 87413 41dfcc 87407->87413 87443 41d8f3 87407->87443 87465 41e0c2 46 API calls 2 library calls 87407->87465 87410->87392 87411->87387 87412->87387 87414 41dfd8 _raise 87413->87414 87415 41dfe0 87414->87415 87416 41dffb 87414->87416 87536 417f8a 46 API calls __getptd_noexit 87415->87536 87418 41e007 87416->87418 87422 41e041 87416->87422 87538 417f8a 46 API calls __getptd_noexit 87418->87538 87420 41dfe5 87537 417f77 46 API calls __getptd_noexit 87420->87537 87421 41e00c 87539 417f77 46 API calls __getptd_noexit 87421->87539 87425 41e063 87422->87425 87426 41e04e 87422->87426 87427 41ae56 ___lock_fhandle 48 API calls 87425->87427 87541 417f8a 46 API calls __getptd_noexit 87426->87541 87430 41e069 87427->87430 87428 41e014 87540 417f25 10 API calls __wctomb_s_l 87428->87540 87432 41e077 87430->87432 87433 41e08b 87430->87433 87431 41e053 87542 417f77 46 API calls __getptd_noexit 87431->87542 87467 41da15 87432->87467 87543 417f77 46 API calls __getptd_noexit 87433->87543 87436 41dfed _raise 87436->87407 87439 41e083 87545 41e0ba LeaveCriticalSection __unlock_fhandle 87439->87545 87440 41e090 87544 417f8a 46 API calls __getptd_noexit 87440->87544 87444 41d900 87443->87444 87448 41d915 87443->87448 87549 417f77 46 API calls __getptd_noexit 87444->87549 87446 41d905 87550 417f25 10 API calls __wctomb_s_l 87446->87550 87449 41d94a 87448->87449 87455 41d910 87448->87455 87546 420603 87448->87546 87451 414139 __filbuf 46 API calls 87449->87451 87452 41d95e 87451->87452 87453 41dfcc __read 59 API calls 87452->87453 87454 41d965 87453->87454 87454->87455 87456 414139 __filbuf 46 API calls 87454->87456 87455->87407 87457 41d988 87456->87457 87457->87455 87458 414139 __filbuf 46 API calls 87457->87458 87459 41d994 87458->87459 87459->87455 87460 414139 __filbuf 46 API calls 87459->87460 87461 41d9a1 87460->87461 87462 414139 __filbuf 46 API calls 87461->87462 87462->87455 87463->87399 87464->87402 87465->87407 87466->87399 87468 41da31 87467->87468 87469 41da4c 87467->87469 87470 417f8a __set_osfhnd 46 API calls 87468->87470 87471 41da5b 87469->87471 87473 41da7a 87469->87473 87472 41da36 87470->87472 87474 417f8a __set_osfhnd 46 API calls 87471->87474 87475 417f77 __wctomb_s_l 46 API calls 87472->87475 87477 41da98 87473->87477 87490 41daac 87473->87490 87476 41da60 87474->87476 87478 41da3e 87475->87478 87480 417f77 __wctomb_s_l 46 API calls 87476->87480 87481 417f8a __set_osfhnd 46 API calls 87477->87481 87478->87439 87479 41db02 87484 417f8a __set_osfhnd 46 API calls 87479->87484 87483 41da67 87480->87483 87482 41da9d 87481->87482 87485 417f77 __wctomb_s_l 46 API calls 87482->87485 87486 417f25 __wctomb_s_l 10 API calls 87483->87486 87487 41db07 87484->87487 87489 41daa4 87485->87489 87486->87478 87488 417f77 __wctomb_s_l 46 API calls 87487->87488 87488->87489 87492 417f25 __wctomb_s_l 10 API calls 87489->87492 87490->87478 87490->87479 87491 41dae1 87490->87491 87494 41db1b 87490->87494 87491->87479 87493 41daec ReadFile 87491->87493 87492->87478 87498 41df8f GetLastError 87493->87498 87503 41dc17 87493->87503 87496 416b04 __malloc_crt 46 API calls 87494->87496 87497 41db31 87496->87497 87501 41db59 87497->87501 87502 41db3b 87497->87502 87499 41de16 87498->87499 87500 41df9c 87498->87500 87511 417f9d __dosmaperr 46 API calls 87499->87511 87515 41dd9b 87499->87515 87506 417f77 __wctomb_s_l 46 API calls 87500->87506 87505 420494 __lseeki64_nolock 48 API calls 87501->87505 87507 417f77 __wctomb_s_l 46 API calls 87502->87507 87503->87498 87504 41dc2b 87503->87504 87504->87515 87516 41dc47 87504->87516 87519 41de5b 87504->87519 87508 41db67 87505->87508 87509 41dfa1 87506->87509 87510 41db40 87507->87510 87508->87493 87512 417f8a __set_osfhnd 46 API calls 87509->87512 87513 417f8a __set_osfhnd 46 API calls 87510->87513 87511->87515 87512->87515 87513->87478 87514 413748 _free 46 API calls 87514->87478 87515->87478 87515->87514 87517 41dcab ReadFile 87516->87517 87524 41dd28 87516->87524 87520 41dcc9 GetLastError 87517->87520 87527 41dcd3 87517->87527 87518 41ded0 ReadFile 87521 41deef GetLastError 87518->87521 87528 41def9 87518->87528 87519->87515 87519->87518 87520->87516 87520->87527 87521->87519 87521->87528 87522 41ddec MultiByteToWideChar 87522->87515 87523 41de10 GetLastError 87522->87523 87523->87499 87524->87515 87525 41dda3 87524->87525 87526 41dd96 87524->87526 87530 41dd60 87524->87530 87525->87530 87531 41ddda 87525->87531 87529 417f77 __wctomb_s_l 46 API calls 87526->87529 87527->87516 87532 420494 __lseeki64_nolock 48 API calls 87527->87532 87528->87519 87533 420494 __lseeki64_nolock 48 API calls 87528->87533 87529->87515 87530->87522 87534 420494 __lseeki64_nolock 48 API calls 87531->87534 87532->87527 87533->87528 87535 41dde9 87534->87535 87535->87522 87536->87420 87537->87436 87538->87421 87539->87428 87540->87436 87541->87431 87542->87428 87543->87440 87544->87439 87545->87436 87547 416b04 __malloc_crt 46 API calls 87546->87547 87548 420618 87547->87548 87548->87449 87549->87446 87550->87455 87554 4148b3 GetSystemTimeAsFileTime __aulldiv 87551->87554 87553 442c6b 87553->87057 87554->87553 87555->87064 87556->87068 87557->87068 87562 45272f __tzset_nolock _wcscpy 87558->87562 87559 4528a4 87559->86979 87559->86980 87560 414d04 61 API calls __fread_nolock 87560->87562 87561 44afef GetSystemTimeAsFileTime 87561->87562 87562->87559 87562->87560 87562->87561 87563 4150d1 81 API calls _fseek 87562->87563 87563->87562 87565 44b1bc 87564->87565 87566 44b1ca 87564->87566 87567 4149c2 116 API calls 87565->87567 87568 44b1e1 87566->87568 87569 44b1d8 87566->87569 87570 4149c2 116 API calls 87566->87570 87567->87566 87599 4321a4 87568->87599 87569->87008 87572 44b2db 87570->87572 87572->87568 87574 44b2e9 87572->87574 87573 44b224 87575 44b253 87573->87575 87576 44b228 87573->87576 87577 44b2f6 87574->87577 87580 414a46 __fcloseall 82 API calls 87574->87580 87603 43213d 87575->87603 87579 44b235 87576->87579 87582 414a46 __fcloseall 82 API calls 87576->87582 87577->87008 87583 44b245 87579->87583 87586 414a46 __fcloseall 82 API calls 87579->87586 87580->87577 87581 44b25a 87584 44b260 87581->87584 87585 44b289 87581->87585 87582->87579 87583->87008 87587 44b26d 87584->87587 87589 414a46 __fcloseall 82 API calls 87584->87589 87613 44b0bf 87 API calls 87585->87613 87586->87583 87590 44b27d 87587->87590 87592 414a46 __fcloseall 82 API calls 87587->87592 87589->87587 87590->87008 87591 44b28f 87614 4320f8 46 API calls _free 87591->87614 87592->87590 87594 44b295 87595 44b2a2 87594->87595 87596 414a46 __fcloseall 82 API calls 87594->87596 87597 44b2b2 87595->87597 87598 414a46 __fcloseall 82 API calls 87595->87598 87596->87595 87597->87008 87598->87597 87600 4321cb 87599->87600 87602 4321b4 __tzset_nolock _memmove 87599->87602 87601 414d04 __fread_nolock 61 API calls 87600->87601 87601->87602 87602->87573 87604 4135bb _malloc 46 API calls 87603->87604 87605 432150 87604->87605 87606 4135bb _malloc 46 API calls 87605->87606 87607 432162 87606->87607 87608 4135bb _malloc 46 API calls 87607->87608 87609 432174 87608->87609 87611 432189 87609->87611 87615 4320f8 46 API calls _free 87609->87615 87611->87581 87612 432198 87612->87581 87613->87591 87614->87594 87615->87612 87616->86908 87617->86912 87618->86930 87619->86930 87620->86930 87621->86924 87622->86930 87623->86930 87624->86934 87625->86943 87626->86944 87627->86944 87677 410160 87628->87677 87630 41012f GetFullPathNameW 87631 410147 ctype 87630->87631 87631->86764 87633 4102cb SHGetDesktopFolder 87632->87633 87634 410333 _wcsncpy 87632->87634 87633->87634 87635 4102e0 _wcsncpy 87633->87635 87634->86767 87635->87634 87636 41031c SHGetPathFromIDListW 87635->87636 87636->87634 87638 425f4a 87637->87638 87639 4101bb 87637->87639 87642 4114ab __wcsicoll 58 API calls 87638->87642 87645 425f6e 87638->87645 87640 410160 52 API calls 87639->87640 87641 4101c7 87640->87641 87681 410200 52 API calls 2 library calls 87641->87681 87642->87638 87644 4101d6 87682 410200 52 API calls 2 library calls 87644->87682 87645->86770 87647 4101e9 87647->86770 87649 40f760 128 API calls 87648->87649 87650 40f584 87649->87650 87651 429335 87650->87651 87652 40f58c 87650->87652 87653 4528bd 118 API calls 87651->87653 87654 40f598 87652->87654 87655 429358 87652->87655 87656 42934b 87653->87656 87700 4033c0 113 API calls 7 library calls 87654->87700 87701 434034 86 API calls _wprintf 87655->87701 87660 429373 87656->87660 87661 42934f 87656->87661 87659 40f5b4 87659->86768 87664 4115d7 52 API calls 87660->87664 87663 431e58 82 API calls 87661->87663 87662 429369 87662->87660 87663->87655 87671 4293c5 ctype 87664->87671 87665 42959c 87666 413748 _free 46 API calls 87665->87666 87667 4295a5 87666->87667 87668 431e58 82 API calls 87667->87668 87669 4295b1 87668->87669 87671->87665 87674 401b10 52 API calls 87671->87674 87683 444af8 87671->87683 87686 402780 87671->87686 87694 4022d0 87671->87694 87702 44c7dd 64 API calls 3 library calls 87671->87702 87703 44b41c 52 API calls 87671->87703 87674->87671 87678 410167 _wcslen 87677->87678 87679 4115d7 52 API calls 87678->87679 87680 41017e _wcscpy 87679->87680 87680->87630 87681->87644 87682->87647 87684 4115d7 52 API calls 87683->87684 87685 444b27 _memmove 87684->87685 87685->87671 87687 402827 87686->87687 87692 402790 ctype _memmove 87686->87692 87689 4115d7 52 API calls 87687->87689 87688 4115d7 52 API calls 87690 402797 87688->87690 87689->87692 87691 4115d7 52 API calls 87690->87691 87693 4027bd 87690->87693 87691->87693 87692->87688 87693->87671 87695 4022e0 87694->87695 87697 40239d 87694->87697 87696 4115d7 52 API calls 87695->87696 87695->87697 87698 402320 ctype 87695->87698 87696->87698 87697->87671 87698->87697 87699 4115d7 52 API calls 87698->87699 87699->87698 87700->87659 87701->87662 87702->87671 87703->87671 87705 402539 ctype 87704->87705 87706 402417 87704->87706 87705->86774 87706->87705 87707 4115d7 52 API calls 87706->87707 87708 402443 87707->87708 87709 4115d7 52 API calls 87708->87709 87710 4024b4 87709->87710 87710->87705 87712 4022d0 52 API calls 87710->87712 87733 402880 95 API calls 2 library calls 87710->87733 87712->87710 87717 401566 87713->87717 87714 401794 87734 40e9a0 90 API calls 87714->87734 87717->87714 87718 40167a 87717->87718 87719 4010a0 52 API calls 87717->87719 87720 4017c0 87718->87720 87735 45e737 90 API calls 3 library calls 87718->87735 87719->87717 87720->86776 87722 40bc70 52 API calls 87721->87722 87731 40d451 87722->87731 87723 40d50f 87738 410600 52 API calls 87723->87738 87725 427c01 87739 45e737 90 API calls 3 library calls 87725->87739 87726 40e0a0 52 API calls 87726->87731 87728 401b10 52 API calls 87728->87731 87729 40d519 87729->86779 87731->87723 87731->87725 87731->87726 87731->87728 87731->87729 87736 40f310 53 API calls 87731->87736 87737 40d860 91 API calls 87731->87737 87733->87710 87734->87718 87735->87720 87736->87731 87737->87731 87738->87729 87739->87729 87740->86792 87741->86793 87743 42c5fe 87742->87743 87758 4091c6 87742->87758 87744 40bc70 52 API calls 87743->87744 87743->87758 87745 42c64e InterlockedIncrement 87744->87745 87746 42c665 87745->87746 87752 42c697 87745->87752 87749 42c672 InterlockedDecrement Sleep InterlockedIncrement 87746->87749 87746->87752 87747 42c737 InterlockedDecrement 87748 42c74a 87747->87748 87751 408f40 VariantClear 87748->87751 87749->87746 87749->87752 87750 42c731 87750->87747 87754 42c752 87751->87754 87752->87747 87752->87750 88026 408e80 87752->88026 88035 410c60 VariantClear ctype 87754->88035 87758->86852 87759 42c6db 87760 402160 52 API calls 87759->87760 87761 42c6e5 87760->87761 88031 45340c 85 API calls 87761->88031 87763 42c6f1 88032 40d200 52 API calls 2 library calls 87763->88032 87765 42c6fb 88033 465124 53 API calls 87765->88033 87767 42c715 87768 42c76a 87767->87768 87769 42c719 87767->87769 87770 401b10 52 API calls 87768->87770 88034 46fe32 VariantClear 87769->88034 87772 42c77e 87770->87772 87773 401980 53 API calls 87772->87773 87780 42c796 87773->87780 87774 42c812 88037 46fe32 VariantClear 87774->88037 87776 42c82a InterlockedDecrement 88038 46ff07 54 API calls 87776->88038 87778 42c849 87781 42c9ec 87778->87781 87787 408f40 VariantClear 87778->87787 87790 402780 52 API calls 87778->87790 87795 401980 53 API calls 87778->87795 88041 40a780 87778->88041 87779 42c864 88039 45e737 90 API calls 3 library calls 87779->88039 87780->87774 87780->87779 88036 40ba10 52 API calls 2 library calls 87780->88036 88082 47d33e 331 API calls 87781->88082 87785 42c9fe 88083 46feb1 VariantClear VariantClear 87785->88083 87787->87778 87788 42ca08 87791 401b10 52 API calls 87788->87791 87789 42c874 87792 408f40 VariantClear 87789->87792 87799 42ca59 87789->87799 87790->87778 87793 42ca15 87791->87793 87794 42c891 87792->87794 87796 40c2c0 52 API calls 87793->87796 88040 410c60 VariantClear ctype 87794->88040 87795->87778 87796->87789 87799->87799 87801 40afc4 87800->87801 87802 40b156 87800->87802 87803 40afd5 87801->87803 87804 42d1e3 87801->87804 88093 45e737 90 API calls 3 library calls 87802->88093 87807 40a780 194 API calls 87803->87807 87821 40b11a ctype 87803->87821 88094 45e737 90 API calls 3 library calls 87804->88094 87810 40b00a 87807->87810 87808 40b143 87808->86852 87809 42d1f8 87813 408f40 VariantClear 87809->87813 87810->87809 87814 40b012 87810->87814 87812 42d4db 87812->87812 87813->87808 87815 42d231 VariantClear 87814->87815 87817 40b04a 87814->87817 87824 40b094 ctype 87814->87824 87819 40b05c ctype 87815->87819 87816 42d45a VariantClear 87816->87821 87817->87819 88095 40e270 VariantClear ctype 87817->88095 87818 40b108 87818->87821 88096 40e270 VariantClear ctype 87818->88096 87823 4115d7 52 API calls 87819->87823 87819->87824 87821->87808 88097 45e737 90 API calls 3 library calls 87821->88097 87823->87824 87824->87818 87825 42d425 ctype 87824->87825 87825->87816 87825->87821 87827 408fff 87826->87827 87831 40900d 87826->87831 88098 403ea0 52 API calls __cinit 87827->88098 87830 42c3f6 88101 45e737 90 API calls 3 library calls 87830->88101 87831->87830 87833 42c44a 87831->87833 87834 40a780 194 API calls 87831->87834 87835 42c47b 87831->87835 87838 42c564 87831->87838 87840 42c4cb 87831->87840 87842 42c548 87831->87842 87846 409112 87831->87846 87848 4090df 87831->87848 87850 42c528 87831->87850 87852 4090ea 87831->87852 87860 4090f2 ctype 87831->87860 88100 4534e3 52 API calls 87831->88100 88102 40c4e0 194 API calls 87831->88102 88103 45e737 90 API calls 3 library calls 87833->88103 87834->87831 88104 451b42 61 API calls 87835->88104 87843 408f40 VariantClear 87838->87843 88106 47faae 233 API calls 87840->88106 88109 45e737 90 API calls 3 library calls 87842->88109 87843->87860 87844 42c491 87844->87860 88105 45e737 90 API calls 3 library calls 87844->88105 87845 42c4da 87845->87860 88107 45e737 90 API calls 3 library calls 87845->88107 87846->87842 87855 40912b 87846->87855 87848->87852 87853 408e80 VariantClear 87848->87853 88108 45e737 90 API calls 3 library calls 87850->88108 87856 408f40 VariantClear 87852->87856 87853->87852 87855->87860 88099 403e10 53 API calls 87855->88099 87856->87860 87858 40914b 87859 408f40 VariantClear 87858->87859 87859->87860 87860->86852 88110 408d90 87861->88110 87863 429778 88138 410c60 VariantClear ctype 87863->88138 87865 429780 87866 42976c 88137 45e737 90 API calls 3 library calls 87866->88137 87867 408cf9 87867->87863 87867->87866 87869 408d2d 87867->87869 88126 403d10 87869->88126 87872 408d71 ctype 87872->86852 87873 408f40 VariantClear 87874 408d45 ctype 87873->87874 87874->87872 87874->87873 87876 4096c6 _wcslen 87875->87876 87877 40a70c ctype _memmove 87876->87877 87878 4115d7 52 API calls 87876->87878 87881 4013a0 52 API calls 87877->87881 87879 4096fa _memmove 87878->87879 87880 4115d7 52 API calls 87879->87880 87882 40971b 87880->87882 87883 4297aa 87881->87883 87882->87877 87885 409749 CharUpperBuffW 87882->87885 87889 40976a ctype 87882->87889 87884 4115d7 52 API calls 87883->87884 87886 4297d1 _memmove 87884->87886 87885->87889 88439 45e737 90 API calls 3 library calls 87886->88439 87936 4097e5 ctype 87889->87936 88413 47dcbb 196 API calls 87889->88413 87890 408f40 VariantClear 87891 42ae92 87890->87891 88440 410c60 VariantClear ctype 87891->88440 87893 42aea4 87894 409aa2 87894->87886 87896 4115d7 52 API calls 87894->87896 87901 409afe 87894->87901 87895 40a689 87898 4115d7 52 API calls 87895->87898 87896->87901 87897 4115d7 52 API calls 87897->87936 87915 40a6af ctype _memmove 87898->87915 87899 409b2a 87903 429dbe 87899->87903 87963 409b4d ctype _memmove 87899->87963 88421 40b400 VariantClear VariantClear ctype 87899->88421 87900 40c2c0 52 API calls 87900->87936 87901->87899 87902 4115d7 52 API calls 87901->87902 87904 429d31 87902->87904 87907 429dd3 87903->87907 88422 40b400 VariantClear VariantClear ctype 87903->88422 87906 429d42 87904->87906 88418 44a801 52 API calls 87904->88418 87919 40e0a0 52 API calls 87906->87919 87907->87963 88423 40e1c0 VariantClear ctype 87907->88423 87908 429a46 VariantClear 87908->87936 87909 409fd2 87912 40a045 87909->87912 87962 42a3f5 87909->87962 87917 4115d7 52 API calls 87912->87917 87913 408f40 VariantClear 87913->87936 87923 4115d7 52 API calls 87915->87923 87924 40a04c 87917->87924 87925 429d57 87919->87925 87921 42a42f 88427 45e737 90 API calls 3 library calls 87921->88427 87923->87877 87926 40a0a7 87924->87926 87929 4091e0 317 API calls 87924->87929 88419 453443 52 API calls 87925->88419 87947 40a0af 87926->87947 88428 40c790 VariantClear ctype 87926->88428 87927 4299d9 87930 408f40 VariantClear 87927->87930 87929->87926 87935 4299e2 87930->87935 87931 429abd 87931->86852 87932 429d88 88420 453443 52 API calls 87932->88420 88415 410c60 VariantClear ctype 87935->88415 87936->87886 87936->87894 87936->87895 87936->87897 87936->87900 87936->87908 87936->87913 87936->87915 87936->87927 87936->87931 87940 40a780 194 API calls 87936->87940 87943 42a452 87936->87943 88414 40c4e0 194 API calls 87936->88414 88416 40ba10 52 API calls 2 library calls 87936->88416 88417 40e270 VariantClear ctype 87936->88417 87940->87936 87942 408f40 VariantClear 87975 40a162 ctype _memmove 87942->87975 87943->87890 87944 4115d7 52 API calls 87944->87963 87945 41130a 51 API calls __cinit 87945->87963 87946 402780 52 API calls 87946->87963 87948 40a11b 87947->87948 87950 42a4b4 VariantClear 87947->87950 87947->87975 87955 40a12d ctype 87948->87955 88429 40e270 VariantClear ctype 87948->88429 87949 40a780 194 API calls 87949->87963 87950->87955 87952 401980 53 API calls 87952->87963 87953 408e80 VariantClear 87953->87963 87954 4115d7 52 API calls 87954->87975 87955->87954 87955->87975 87956 408e80 VariantClear 87956->87975 87958 44a801 52 API calls 87958->87963 87959 42a74d VariantClear 87959->87975 87960 40a368 87961 42aad4 87960->87961 87970 40a397 87960->87970 88432 46fe90 VariantClear VariantClear ctype 87961->88432 88426 47390f VariantClear 87962->88426 87963->87877 87963->87909 87963->87921 87963->87944 87963->87945 87963->87946 87963->87949 87963->87952 87963->87953 87963->87958 87963->87962 87966 409c95 87963->87966 88424 45f508 52 API calls 87963->88424 88425 403e10 53 API calls 87963->88425 87964 42a886 VariantClear 87964->87975 87965 42a7e4 VariantClear 87965->87975 87966->86852 87967 40a3ce 87979 40a3d9 ctype 87967->87979 88433 40b400 VariantClear VariantClear ctype 87967->88433 87969 40e270 VariantClear 87969->87975 87970->87967 87992 40a42c ctype 87970->87992 88412 40b400 VariantClear VariantClear ctype 87970->88412 87973 42abaf 87977 42abd4 VariantClear 87973->87977 87986 40a4ee ctype 87973->87986 87974 4115d7 52 API calls 87978 42a5a6 VariantInit VariantCopy 87974->87978 87975->87942 87975->87956 87975->87959 87975->87960 87975->87961 87975->87964 87975->87965 87975->87969 87975->87974 87982 4115d7 52 API calls 87975->87982 88430 470870 52 API calls 87975->88430 88431 44ccf1 VariantClear ctype 87975->88431 87976 40a4dc 87976->87986 88435 40e270 VariantClear ctype 87976->88435 87977->87986 87978->87975 87981 42a5c6 VariantClear 87978->87981 87980 40a41a 87979->87980 87988 42ab44 VariantClear 87979->87988 87979->87992 87980->87992 88434 40e270 VariantClear ctype 87980->88434 87981->87975 87982->87975 87983 42ac4f 87989 42ac79 VariantClear 87983->87989 87994 40a546 ctype 87983->87994 87986->87983 87987 40a534 87986->87987 87987->87994 88436 40e270 VariantClear ctype 87987->88436 87988->87992 87989->87994 87991 42ad28 87996 42ad4e VariantClear 87991->87996 88001 40a583 ctype 87991->88001 87992->87973 87992->87976 87994->87991 87995 40a571 87994->87995 87995->88001 88437 40e270 VariantClear ctype 87995->88437 87996->88001 87998 40a650 ctype 87998->86852 87999 42ae0e VariantClear 87999->88001 88001->87998 88001->87999 88438 40e270 VariantClear ctype 88001->88438 88002->86852 88003->86852 88004->86852 88005->86803 88006->86807 88007->86852 88008->86852 88009->86852 88010->86852 88011->86860 88012->86860 88013->86860 88014->86860 88015->86860 88016->86860 88017->86860 88019 403cdf 88018->88019 88020 408f40 VariantClear 88019->88020 88021 403ce7 88020->88021 88021->86846 88022->86860 88023->86860 88024->86852 88025->86800 88027 408e88 88026->88027 88029 408e94 88026->88029 88028 408f40 VariantClear 88027->88028 88028->88029 88030 45340c 85 API calls 88029->88030 88030->87759 88031->87763 88032->87765 88033->87767 88034->87750 88035->87758 88036->87780 88037->87776 88038->87778 88039->87789 88040->87758 88042 40a7a6 88041->88042 88043 40ae8c 88041->88043 88045 4115d7 52 API calls 88042->88045 88084 41130a 51 API calls __cinit 88043->88084 88078 40a7c6 ctype _memmove 88045->88078 88046 40a86d 88047 40abd1 88046->88047 88063 40a878 ctype 88046->88063 88089 45e737 90 API calls 3 library calls 88047->88089 88048 408e80 VariantClear 88048->88078 88050 40bc10 53 API calls 88050->88078 88051 401b10 52 API calls 88051->88078 88052 42b791 VariantClear 88052->88078 88053 40b5f0 89 API calls 88053->88078 88054 408f40 VariantClear 88054->88063 88055 42ba2d VariantClear 88055->88078 88056 40e270 VariantClear 88056->88078 88057 42b459 VariantClear 88057->88078 88058 40a884 ctype 88058->87778 88059 42b6f6 VariantClear 88059->88078 88060 408cc0 187 API calls 88060->88078 88062 42bc5b 88062->87778 88063->88054 88063->88058 88064 42bbf5 88090 45e737 90 API calls 3 library calls 88064->88090 88065 4115d7 52 API calls 88065->88078 88066 42bb6a 88092 44b92d VariantClear 88066->88092 88067 4115d7 52 API calls 88069 42b5b3 VariantInit VariantCopy 88067->88069 88072 42b5d7 VariantClear 88069->88072 88069->88078 88071 408f40 VariantClear 88071->88078 88072->88078 88075 42bc37 88091 45e737 90 API calls 3 library calls 88075->88091 88078->88046 88078->88047 88078->88048 88078->88050 88078->88051 88078->88052 88078->88053 88078->88055 88078->88056 88078->88057 88078->88059 88078->88060 88078->88064 88078->88065 88078->88066 88078->88067 88078->88071 88078->88075 88081 4530c9 VariantClear 88078->88081 88085 45308a 53 API calls 88078->88085 88086 470870 52 API calls 88078->88086 88087 457f66 87 API calls __write_nolock 88078->88087 88088 472f47 127 API calls 88078->88088 88079 42bc48 88079->88066 88080 408f40 VariantClear 88079->88080 88080->88066 88081->88078 88082->87785 88083->87788 88084->88078 88085->88078 88086->88078 88087->88078 88088->88078 88089->88066 88090->88066 88091->88079 88092->88062 88093->87804 88094->87809 88095->87819 88096->87821 88097->87812 88098->87831 88099->87858 88100->87831 88101->87860 88102->87831 88103->87860 88104->87844 88105->87860 88106->87845 88107->87860 88108->87860 88109->87838 88111 4289d2 88110->88111 88112 408db3 88110->88112 88141 45e737 90 API calls 3 library calls 88111->88141 88139 40bec0 90 API calls 88112->88139 88115 4289e5 88142 45e737 90 API calls 3 library calls 88115->88142 88117 428a05 88119 408f40 VariantClear 88117->88119 88125 408e5a 88119->88125 88120 40a780 194 API calls 88123 408dc9 88120->88123 88121 408e64 88122 408f40 VariantClear 88121->88122 88122->88125 88123->88115 88123->88117 88123->88120 88123->88121 88124 408f40 VariantClear 88123->88124 88123->88125 88140 40ba10 52 API calls 2 library calls 88123->88140 88124->88123 88125->87867 88127 408f40 VariantClear 88126->88127 88128 403d20 88127->88128 88129 403cd0 VariantClear 88128->88129 88130 403d4d 88129->88130 88132 4013c0 52 API calls 88130->88132 88143 46e91c 88130->88143 88146 45e17d 88130->88146 88156 4755ad 88130->88156 88159 467897 88130->88159 88131 403d76 88131->87863 88131->87874 88132->88131 88137->87863 88138->87865 88139->88123 88140->88123 88141->88115 88142->88117 88203 46e785 88143->88203 88145 46e92f 88145->88131 88147 45e198 88146->88147 88148 45e19c 88147->88148 88149 45e1b8 88147->88149 88150 408f40 VariantClear 88148->88150 88151 45e1cc 88149->88151 88152 45e1db FindClose 88149->88152 88153 45e1a4 88150->88153 88154 45e1d9 ctype 88151->88154 88155 44ae3e CloseHandle 88151->88155 88152->88154 88153->88131 88154->88131 88155->88154 88305 475077 88156->88305 88158 4755c0 88158->88131 88160 4678bb 88159->88160 88161 467954 88160->88161 88406 45340c 85 API calls 88160->88406 88162 4115d7 52 API calls 88161->88162 88194 467964 88161->88194 88163 467989 88162->88163 88168 467995 88163->88168 88410 40da60 53 API calls 88163->88410 88165 4678f6 88167 413a0e __wsplitpath 46 API calls 88165->88167 88170 4678fc 88167->88170 88169 4533eb 85 API calls 88168->88169 88171 4679b7 88169->88171 88172 401b10 52 API calls 88170->88172 88174 40de40 60 API calls 88171->88174 88173 46790c 88172->88173 88407 40d200 52 API calls 2 library calls 88173->88407 88175 4679c3 88174->88175 88177 4679c7 GetLastError 88175->88177 88178 467a05 88175->88178 88180 403cd0 VariantClear 88177->88180 88183 467a2c 88178->88183 88184 467a4b 88178->88184 88179 467917 88179->88161 88408 4339fa GetFileAttributesW FindFirstFileW FindClose 88179->88408 88181 4679dc 88180->88181 88185 4679e6 88181->88185 88190 44ae3e CloseHandle 88181->88190 88188 4115d7 52 API calls 88183->88188 88186 4115d7 52 API calls 88184->88186 88193 408f40 VariantClear 88185->88193 88191 467a49 88186->88191 88187 467928 88187->88161 88192 46792f 88187->88192 88189 467a31 88188->88189 88411 436299 52 API calls 2 library calls 88189->88411 88190->88185 88198 408f40 VariantClear 88191->88198 88409 4335cd 56 API calls 3 library calls 88192->88409 88197 4679ed 88193->88197 88194->88131 88197->88131 88200 467a88 88198->88200 88199 467939 88199->88161 88201 408f40 VariantClear 88199->88201 88200->88131 88202 467947 88201->88202 88202->88161 88204 46e7a2 88203->88204 88205 4115d7 52 API calls 88204->88205 88208 46e802 88204->88208 88206 46e7ad 88205->88206 88207 46e7b9 88206->88207 88251 40da60 53 API calls 88206->88251 88252 4533eb 88207->88252 88209 46e7e5 88208->88209 88216 46e82f 88208->88216 88210 408f40 VariantClear 88209->88210 88212 46e7ea 88210->88212 88212->88145 88215 46e8b5 88244 4680ed 88215->88244 88216->88215 88219 46e845 88216->88219 88222 4533eb 85 API calls 88219->88222 88221 46e8bb 88248 443fbe 88221->88248 88229 46e84b 88222->88229 88223 46e7db 88223->88209 88268 44ae3e 88223->88268 88225 46e87a 88271 4689f4 59 API calls 88225->88271 88226 46e883 88230 4013c0 52 API calls 88226->88230 88229->88225 88229->88226 88232 46e88f 88230->88232 88233 40e0a0 52 API calls 88232->88233 88235 46e899 88233->88235 88234 408f40 VariantClear 88242 46e881 88234->88242 88272 40d200 52 API calls 2 library calls 88235->88272 88236 46e911 88236->88145 88239 46e8a5 88273 4689f4 59 API calls 88239->88273 88241 46e903 88243 44ae3e CloseHandle 88241->88243 88242->88236 88274 40da20 88242->88274 88243->88236 88245 468100 88244->88245 88246 4680fa 88244->88246 88245->88221 88278 467ac4 55 API calls 2 library calls 88246->88278 88279 443e36 88248->88279 88250 443fd3 88250->88234 88250->88242 88251->88207 88253 453404 88252->88253 88254 4533f8 88252->88254 88256 40de40 88253->88256 88254->88253 88286 4531b1 85 API calls 5 library calls 88254->88286 88257 40da20 CloseHandle 88256->88257 88258 40de4e 88257->88258 88287 40f110 88258->88287 88261 4264fa 88263 40de84 88296 40e080 SetFilePointerEx SetFilePointerEx 88263->88296 88265 40de8b 88297 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88265->88297 88267 40de90 88267->88216 88267->88223 88270 44ae4b ctype 88268->88270 88299 443fdf 88268->88299 88270->88209 88271->88242 88272->88239 88273->88242 88275 40da37 88274->88275 88276 40da29 88274->88276 88275->88276 88277 40da3c CloseHandle 88275->88277 88276->88241 88277->88241 88278->88245 88282 443e19 88279->88282 88283 443e26 88282->88283 88284 443e32 WriteFile 88282->88284 88285 443db4 SetFilePointerEx SetFilePointerEx 88283->88285 88284->88250 88285->88284 88286->88253 88288 40f125 CreateFileW 88287->88288 88289 42630c 88287->88289 88291 40de74 88288->88291 88290 426311 CreateFileW 88289->88290 88289->88291 88290->88291 88292 426337 88290->88292 88291->88261 88295 40dea0 55 API calls ctype 88291->88295 88298 40df90 SetFilePointerEx SetFilePointerEx 88292->88298 88294 426342 88294->88291 88295->88263 88296->88265 88297->88267 88298->88294 88300 40da20 CloseHandle 88299->88300 88301 443feb 88300->88301 88304 4340db CloseHandle ctype 88301->88304 88303 444001 88303->88270 88304->88303 88306 4533eb 85 API calls 88305->88306 88307 4750b8 88306->88307 88308 4750ee 88307->88308 88309 475129 88307->88309 88310 408f40 VariantClear 88308->88310 88358 4646e0 88309->88358 88315 4750f5 88310->88315 88312 47515e 88313 475162 88312->88313 88331 47518e 88312->88331 88314 408f40 VariantClear 88313->88314 88332 475169 88314->88332 88315->88158 88316 475365 88392 44b3ac 57 API calls 88316->88392 88317 4754ea 88398 464812 92 API calls 88317->88398 88321 475374 88371 430d31 88321->88371 88322 4754fc 88322->88321 88324 475508 88322->88324 88323 4533eb 85 API calls 88323->88331 88326 408f40 VariantClear 88324->88326 88327 47550f 88326->88327 88327->88332 88328 475388 88378 4577e9 88328->88378 88331->88323 88334 475480 88331->88334 88343 475357 88331->88343 88345 4754b5 88331->88345 88390 436299 52 API calls 2 library calls 88331->88390 88391 463ad5 64 API calls __wcsicoll 88331->88391 88332->88158 88333 47539e 88386 410cfc 88333->88386 88336 408f40 VariantClear 88334->88336 88336->88332 88338 4753d4 88394 40e830 53 API calls 88338->88394 88339 4753b8 88393 45e737 90 API calls 3 library calls 88339->88393 88342 4753c5 GetCurrentProcess TerminateProcess 88342->88338 88343->88316 88343->88317 88344 4753e3 88356 475406 88344->88356 88395 40cf00 53 API calls 88344->88395 88346 408f40 VariantClear 88345->88346 88346->88332 88347 475556 88347->88332 88352 47556e FreeLibrary 88347->88352 88349 4753f8 88396 46c43e 106 API calls 2 library calls 88349->88396 88352->88332 88355 408e80 VariantClear 88355->88356 88356->88347 88356->88355 88357 408f40 VariantClear 88356->88357 88397 40cf00 53 API calls 88356->88397 88399 44b3ac 57 API calls 88356->88399 88400 46c43e 106 API calls 2 library calls 88356->88400 88357->88356 88401 4536f7 53 API calls 88358->88401 88360 4646fc 88402 4426cd 59 API calls _wcslen 88360->88402 88362 464711 88364 40bc70 52 API calls 88362->88364 88370 46474b 88362->88370 88365 46472c 88364->88365 88403 461465 52 API calls _memmove 88365->88403 88367 464793 88367->88312 88368 464741 88369 40c600 52 API calls 88368->88369 88369->88370 88370->88367 88404 463ad5 64 API calls __wcsicoll 88370->88404 88372 430db2 88371->88372 88373 430d54 88371->88373 88372->88328 88374 4115d7 52 API calls 88373->88374 88375 430d74 88374->88375 88376 430da9 88375->88376 88377 4115d7 52 API calls 88375->88377 88376->88328 88377->88375 88379 457a84 88378->88379 88385 45780c _strcat _wcslen _wcscpy ctype 88378->88385 88379->88333 88380 443006 57 API calls 88380->88385 88382 4135bb 46 API calls _malloc 88382->88385 88383 45340c 85 API calls 88383->88385 88384 40f6f0 54 API calls 88384->88385 88385->88379 88385->88380 88385->88382 88385->88383 88385->88384 88405 44b3ac 57 API calls 88385->88405 88388 410d11 88386->88388 88387 410da9 VirtualProtect 88389 410d77 88387->88389 88388->88387 88388->88389 88389->88338 88389->88339 88390->88331 88391->88331 88392->88321 88393->88342 88394->88344 88395->88349 88396->88356 88397->88356 88398->88322 88399->88356 88400->88356 88401->88360 88402->88362 88403->88368 88404->88367 88405->88385 88406->88165 88407->88179 88408->88187 88409->88199 88410->88168 88411->88191 88412->87967 88413->87889 88414->87936 88415->87998 88416->87936 88417->87936 88418->87906 88419->87932 88420->87899 88421->87903 88422->87907 88423->87963 88424->87963 88425->87963 88426->87921 88427->87943 88428->87926 88429->87955 88430->87975 88431->87975 88432->87967 88433->87979 88434->87992 88435->87986 88436->87994 88437->88001 88438->88001 88439->87943 88440->87893 88441 42d154 88445 480a8d 88441->88445 88443 42d161 88444 480a8d 194 API calls 88443->88444 88444->88443 88446 480ae4 88445->88446 88447 480b26 88445->88447 88448 480aeb 88446->88448 88449 480b15 88446->88449 88450 40bc70 52 API calls 88447->88450 88451 480aee 88448->88451 88452 480b04 88448->88452 88478 4805bf 194 API calls 88449->88478 88464 480b2e 88450->88464 88451->88447 88454 480af3 88451->88454 88477 47fea2 194 API calls __itow_s 88452->88477 88476 47f135 194 API calls 88454->88476 88456 40e0a0 52 API calls 88456->88464 88459 408f40 VariantClear 88461 481156 88459->88461 88460 480aff 88460->88459 88462 408f40 VariantClear 88461->88462 88463 48115e 88462->88463 88463->88443 88464->88456 88464->88460 88465 401980 53 API calls 88464->88465 88467 40c2c0 52 API calls 88464->88467 88468 408e80 VariantClear 88464->88468 88469 40e710 53 API calls 88464->88469 88470 480ff5 88464->88470 88471 40a780 194 API calls 88464->88471 88479 45377f 52 API calls 88464->88479 88480 45e951 53 API calls 88464->88480 88481 40e830 53 API calls 88464->88481 88482 47925f 53 API calls 88464->88482 88483 47fcff 194 API calls 88464->88483 88465->88464 88467->88464 88468->88464 88469->88464 88484 45e737 90 API calls 3 library calls 88470->88484 88471->88464 88476->88460 88477->88460 88478->88460 88479->88464 88480->88464 88481->88464 88482->88464 88483->88464 88484->88460 88485 4101418 88499 40ff038 88485->88499 88487 4101522 88502 4101308 88487->88502 88505 4102568 GetPEB 88499->88505 88501 40ff6c3 88501->88487 88503 4101311 Sleep 88502->88503 88504 410131f 88503->88504 88506 4102592 88505->88506 88506->88501 88507 42b14b 88514 40bc10 88507->88514 88509 42b159 88510 4096a0 331 API calls 88509->88510 88511 42b177 88510->88511 88525 44b92d VariantClear 88511->88525 88513 42bc5b 88515 40bc24 88514->88515 88516 40bc17 88514->88516 88518 40bc2a 88515->88518 88519 40bc3c 88515->88519 88517 408e80 VariantClear 88516->88517 88520 40bc1f 88517->88520 88521 408e80 VariantClear 88518->88521 88522 4115d7 52 API calls 88519->88522 88520->88509 88523 40bc33 88521->88523 88524 40bc43 88522->88524 88523->88509 88524->88509 88525->88513 88526 425b2b 88531 40f000 88526->88531 88530 425b3a 88532 4115d7 52 API calls 88531->88532 88533 40f007 88532->88533 88534 4276ea 88533->88534 88540 40f030 88533->88540 88539 41130a 51 API calls __cinit 88539->88530 88541 40f039 88540->88541 88542 40f01a 88540->88542 88570 41130a 51 API calls __cinit 88541->88570 88544 40e500 88542->88544 88545 40bc70 52 API calls 88544->88545 88546 40e515 GetVersionExW 88545->88546 88547 402160 52 API calls 88546->88547 88548 40e557 88547->88548 88571 40e660 88548->88571 88553 427674 88558 4276c6 GetSystemInfo 88553->88558 88556 40e5e0 88559 4276d5 GetSystemInfo 88556->88559 88585 40efd0 88556->88585 88557 40e5cd GetCurrentProcess 88592 40ef20 LoadLibraryA GetProcAddress 88557->88592 88558->88559 88563 40e629 88589 40ef90 88563->88589 88566 40e641 FreeLibrary 88567 40e644 88566->88567 88568 40e653 FreeLibrary 88567->88568 88569 40e656 88567->88569 88568->88569 88569->88539 88570->88542 88572 40e667 88571->88572 88573 42761d 88572->88573 88574 40c600 52 API calls 88572->88574 88575 40e55c 88574->88575 88576 40e680 88575->88576 88577 40e687 88576->88577 88578 427616 88577->88578 88579 40c600 52 API calls 88577->88579 88580 40e566 88579->88580 88580->88553 88581 40ef60 88580->88581 88582 40e5c8 88581->88582 88583 40ef66 LoadLibraryA 88581->88583 88582->88556 88582->88557 88583->88582 88584 40ef77 GetProcAddress 88583->88584 88584->88582 88586 40e620 88585->88586 88587 40efd6 LoadLibraryA 88585->88587 88586->88558 88586->88563 88587->88586 88588 40efe7 GetProcAddress 88587->88588 88588->88586 88593 40efb0 LoadLibraryA GetProcAddress 88589->88593 88591 40e632 GetNativeSystemInfo 88591->88566 88591->88567 88592->88556 88593->88591 88594 425b5e 88599 40c7f0 88594->88599 88598 425b6d 88634 40db10 52 API calls 88599->88634 88601 40c82a 88635 410ab0 6 API calls 88601->88635 88603 40c86d 88604 40bc70 52 API calls 88603->88604 88605 40c877 88604->88605 88606 40bc70 52 API calls 88605->88606 88607 40c881 88606->88607 88608 40bc70 52 API calls 88607->88608 88609 40c88b 88608->88609 88610 40bc70 52 API calls 88609->88610 88611 40c8d1 88610->88611 88612 40bc70 52 API calls 88611->88612 88613 40c991 88612->88613 88636 40d2c0 52 API calls 88613->88636 88615 40c99b 88637 40d0d0 53 API calls 88615->88637 88617 40c9c1 88618 40bc70 52 API calls 88617->88618 88619 40c9cb 88618->88619 88638 40e310 53 API calls 88619->88638 88621 40ca28 88622 408f40 VariantClear 88621->88622 88623 40ca30 88622->88623 88624 408f40 VariantClear 88623->88624 88625 40ca38 GetStdHandle 88624->88625 88626 429630 88625->88626 88627 40ca87 88625->88627 88626->88627 88628 429639 88626->88628 88633 41130a 51 API calls __cinit 88627->88633 88639 4432c0 57 API calls 88628->88639 88630 429641 88640 44b6ab CreateThread 88630->88640 88632 42964f CloseHandle 88632->88627 88633->88598 88634->88601 88635->88603 88636->88615 88637->88617 88638->88621 88639->88630 88640->88632 88641 44b5cb 58 API calls 88640->88641 88642 425b6f 88647 40dc90 88642->88647 88646 425b7e 88648 40bc70 52 API calls 88647->88648 88649 40dd03 88648->88649 88655 40f210 88649->88655 88651 40dd96 88653 40ddb7 88651->88653 88658 40dc00 52 API calls 2 library calls 88651->88658 88654 41130a 51 API calls __cinit 88653->88654 88654->88646 88659 40f250 RegOpenKeyExW 88655->88659 88657 40f230 88657->88651 88658->88651 88660 425e17 88659->88660 88661 40f275 RegQueryValueExW 88659->88661 88660->88657 88662 40f2c3 RegCloseKey 88661->88662 88663 40f298 88661->88663 88662->88657 88664 40f2a9 RegCloseKey 88663->88664 88665 425e1d 88663->88665 88664->88657
                                                APIs
                                                • _wcslen.LIBCMT ref: 004096C1
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • _memmove.LIBCMT ref: 0040970C
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                • _memmove.LIBCMT ref: 00409D96
                                                • _memmove.LIBCMT ref: 0040A6C4
                                                • _memmove.LIBCMT ref: 004297E5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                • String ID:
                                                • API String ID: 2383988440-0
                                                • Opcode ID: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                                • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                • Opcode Fuzzy Hash: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                                • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                  • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ItPTgiBC07.exe,00000104,?), ref: 00401F4C
                                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                  • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\ItPTgiBC07.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                  • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                  • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                  • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                  • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                  • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                  • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                  • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                • String ID: C:\Users\user\Desktop\ItPTgiBC07.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                • API String ID: 2495805114-2437393528
                                                • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1936 40e5ec-40e60c 1918->1936 1937 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1937 1938 4276c6-4276ca GetSystemInfo 1919->1938 1920->1919 1929 427698-4276a8 1920->1929 1921->1919 1925 427636-427640 1922->1925 1926 42762b-427631 1922->1926 1927 40e5a5-40e5ae 1923->1927 1928 427654-427657 1923->1928 1925->1918 1926->1918 1932 40e5b4 1927->1932 1933 427645-42764f 1927->1933 1928->1918 1931 42765d-42766f 1928->1931 1934 4276b0 1929->1934 1935 4276aa-4276ae 1929->1935 1931->1918 1932->1918 1933->1918 1934->1919 1935->1919 1939 40e612-40e623 call 40efd0 1936->1939 1940 4276d5-4276df GetSystemInfo 1936->1940 1937->1936 1947 40e5e8 1937->1947 1938->1940 1939->1938 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1936 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                • String ID: 0SH
                                                • API String ID: 3363477735-851180471
                                                • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                APIs
                                                • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: IsThemeActive$uxtheme.dll
                                                • API String ID: 2574300362-3542929980
                                                • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                • TranslateMessage.USER32(?), ref: 00409556
                                                • DispatchMessageW.USER32(?), ref: 00409561
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchSleepTranslate
                                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                • API String ID: 1762048999-758534266
                                                • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                Control-flow Graph

                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ItPTgiBC07.exe,00000104,?), ref: 00401F4C
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • __wcsicoll.LIBCMT ref: 00402007
                                                • __wcsicoll.LIBCMT ref: 0040201D
                                                • __wcsicoll.LIBCMT ref: 00402033
                                                  • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                • __wcsicoll.LIBCMT ref: 00402049
                                                • _wcscpy.LIBCMT ref: 0040207C
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ItPTgiBC07.exe,00000104), ref: 00428B5B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\ItPTgiBC07.exe$CMDLINE$CMDLINERAW
                                                • API String ID: 3948761352-1511985441
                                                • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fread_nolock$_fseek_wcscpy
                                                • String ID: D)E$D)E$FILE
                                                • API String ID: 3888824918-361185794
                                                • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                • __wsplitpath.LIBCMT ref: 0040E41C
                                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                • _wcsncat.LIBCMT ref: 0040E433
                                                • __wmakepath.LIBCMT ref: 0040E44F
                                                  • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                • _wcscpy.LIBCMT ref: 0040E487
                                                  • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                • _wcscat.LIBCMT ref: 00427541
                                                • _wcslen.LIBCMT ref: 00427551
                                                • _wcslen.LIBCMT ref: 00427562
                                                • _wcscat.LIBCMT ref: 0042757C
                                                • _wcsncpy.LIBCMT ref: 004275BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                • String ID: Include$\
                                                • API String ID: 3173733714-3429789819
                                                • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                Control-flow Graph

                                                APIs
                                                • _fseek.LIBCMT ref: 0045292B
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                • __fread_nolock.LIBCMT ref: 00452961
                                                • __fread_nolock.LIBCMT ref: 00452971
                                                • __fread_nolock.LIBCMT ref: 0045298A
                                                • __fread_nolock.LIBCMT ref: 004529A5
                                                • _fseek.LIBCMT ref: 004529BF
                                                • _malloc.LIBCMT ref: 004529CA
                                                • _malloc.LIBCMT ref: 004529D6
                                                • __fread_nolock.LIBCMT ref: 004529E7
                                                • _free.LIBCMT ref: 00452A17
                                                • _free.LIBCMT ref: 00452A20
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                • String ID:
                                                • API String ID: 1255752989-0
                                                • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                • ImageList_ReplaceIcon.COMCTL32(0091ED08,000000FF,00000000), ref: 00410552
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                • RegisterClassExW.USER32(?), ref: 0041045D
                                                  • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                  • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                  • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                  • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                  • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                  • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                  • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(0091ED08,000000FF,00000000), ref: 00410552
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _malloc
                                                • String ID: Default
                                                • API String ID: 1579825452-753088835
                                                • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1970 40f696-40f69c 1966->1970 1968 40f660-40f674 call 4150d1 1967->1968 1969 40f63e 1967->1969 1974 40f679-40f67c 1968->1974 1971 40f640 1969->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1968 1977->1971 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1981 40f6b4-40f6c2 1980->1981 1982 40f6af-40f6b2 1980->1982 1984 425d16 1981->1984 1985 40f6c8-40f6d6 1981->1985 1982->1975 1984->1978 1987 425d05-425d0b 1985->1987 1988 40f6dc-40f6df 1985->1988 1987->1973 1990 425d11 1987->1990 1988->1975 1990->1984 1991->1970
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fread_nolock_fseek_memmove_strcat
                                                • String ID: AU3!$EA06
                                                • API String ID: 1268643489-2658333250
                                                • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2009 401193-40119a 2002->2009 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2008 42b045-42b059 call 401000 call 40e0c0 2005->2008 2012 401219-40121f 2006->2012 2013 40115d 2006->2013 2010 4011a3-4011a9 2007->2010 2011 42afb4-42afc5 call 40f190 2007->2011 2008->2000 2010->2001 2016 4011af 2010->2016 2011->2009 2012->2001 2019 401225-42b06d call 468b0e 2012->2019 2017 401163-401166 2013->2017 2018 42b01d-42b024 2013->2018 2016->2001 2022 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2016->2022 2023 4011db-401202 SetTimer RegisterWindowMessageW 2016->2023 2025 42afe9-42b018 call 40f190 call 401a50 2017->2025 2026 40116c-401172 2017->2026 2018->2000 2024 42b02a-42b033 call 4370f4 2018->2024 2019->2009 2023->2009 2032 401204-401216 CreatePopupMenu 2023->2032 2024->2000 2025->2000 2026->2001 2034 401174-42afde call 45fd57 2026->2034 2034->2000 2045 42afe4 2034->2045 2045->2009
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                • CreatePopupMenu.USER32 ref: 00401204
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                                APIs
                                                • _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                • std::exception::exception.LIBCMT ref: 00411626
                                                • std::exception::exception.LIBCMT ref: 00411640
                                                • __CxxThrowException@8.LIBCMT ref: 00411651
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                • String ID: ,*H$4*H$@fI
                                                • API String ID: 615853336-1459471987
                                                • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2065 40ff958-40ff9aa call 40ff858 CreateFileW 2068 40ff9ac-40ff9ae 2065->2068 2069 40ff9b3-40ff9c0 2065->2069 2070 40ffb0c-40ffb10 2068->2070 2072 40ff9d3-40ff9ea VirtualAlloc 2069->2072 2073 40ff9c2-40ff9ce 2069->2073 2074 40ff9ec-40ff9ee 2072->2074 2075 40ff9f3-40ffa19 CreateFileW 2072->2075 2073->2070 2074->2070 2076 40ffa3d-40ffa57 ReadFile 2075->2076 2077 40ffa1b-40ffa38 2075->2077 2079 40ffa7b-40ffa7f 2076->2079 2080 40ffa59-40ffa76 2076->2080 2077->2070 2082 40ffa81-40ffa9e 2079->2082 2083 40ffaa0-40ffab7 WriteFile 2079->2083 2080->2070 2082->2070 2084 40ffab9-40ffae0 2083->2084 2085 40ffae2-40ffb07 CloseHandle VirtualFree 2083->2085 2084->2070 2085->2070
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 040FF99D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                • Instruction ID: 4e8ed4deefa16b4ed8ce053781bffa1865826044c43cb1a25775f22972dd8bf9
                                                • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                • Instruction Fuzzy Hash: EF5107B5A50209FBEB60DFA0CC59FDE77B8AF48700F108555F60AEB180DA74A644DB60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2095 4102b0-4102c5 SHGetMalloc 2096 4102cb-4102da SHGetDesktopFolder 2095->2096 2097 425dfd-425e0e call 433244 2095->2097 2098 4102e0-41031a call 412fba 2096->2098 2099 41036b-410379 2096->2099 2107 410360-410368 2098->2107 2108 41031c-410331 SHGetPathFromIDListW 2098->2108 2099->2097 2105 41037f-410384 2099->2105 2107->2099 2109 410351-41035d 2108->2109 2110 410333-41034a call 412fba 2108->2110 2109->2107 2110->2109
                                                APIs
                                                • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                • _wcsncpy.LIBCMT ref: 004102ED
                                                • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                • _wcsncpy.LIBCMT ref: 00410340
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                • String ID: C:\Users\user\Desktop\ItPTgiBC07.exe
                                                • API String ID: 3170942423-4158714151
                                                • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2113 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2116 427190-4271ae RegQueryValueExW 2113->2116 2117 40e4eb-40e4f0 2113->2117 2118 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2116->2118 2119 42721a-42722a RegCloseKey 2116->2119 2124 427210-427219 call 436508 2118->2124 2125 4271f7-42720e call 402160 2118->2125 2124->2119 2125->2124
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: QueryValue$CloseOpen
                                                • String ID: Include$Software\AutoIt v3\AutoIt
                                                • API String ID: 1586453840-614718249
                                                • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2130 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                APIs
                                                • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • _wcsncpy.LIBCMT ref: 00401C41
                                                • _wcscpy.LIBCMT ref: 00401C5D
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                • String ID: Line:
                                                • API String ID: 1874344091-1585850449
                                                • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Close$OpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 1607946009-824357125
                                                • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                APIs
                                                  • Part of subcall function 04101308: Sleep.KERNELBASE(000001F4), ref: 04101319
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0410158E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: 4YFODOEFAMC1DGYHVIO7Z3LBHN
                                                • API String ID: 2694422964-3915532988
                                                • Opcode ID: 78c1a7b861104dccd2419e2d2902802fe5d5b6e13fa153b29f457d96cd832e85
                                                • Instruction ID: 37f6fe703938d1e11692eaae7643858969130711f7c6cc2b8818be8ba1d429e8
                                                • Opcode Fuzzy Hash: 78c1a7b861104dccd2419e2d2902802fe5d5b6e13fa153b29f457d96cd832e85
                                                • Instruction Fuzzy Hash: B6718270D0438CDAEF11DBB4D854BEEBB75AF19304F044199E248BB2C0D7BA1A45CB6A
                                                APIs
                                                  • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                • _free.LIBCMT ref: 004295A0
                                                  • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                  • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                  • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                  • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                  • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                  • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\ItPTgiBC07.exe
                                                • API String ID: 3938964917-404748379
                                                • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: Error:
                                                • API String ID: 4104443479-232661952
                                                • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                APIs
                                                • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\ItPTgiBC07.exe,0040F545,C:\Users\user\Desktop\ItPTgiBC07.exe,004A90E8,C:\Users\user\Desktop\ItPTgiBC07.exe,?,0040F545), ref: 0041013C
                                                  • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                  • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                  • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                  • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                • String ID: X$pWH
                                                • API String ID: 85490731-941433119
                                                • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 0410007D
                                                • ExitProcess.KERNEL32(00000000), ref: 0410009C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process$CreateExit
                                                • String ID: D
                                                • API String ID: 126409537-2746444292
                                                • Opcode ID: 0821f884aa5cc6b4c195274ad0b22897ff79d929f6fdf946f6e29fa30509634f
                                                • Instruction ID: 64c34faa258bc0edc29be7b155ac3a3a8fe440ca45b24c8921c849d741e380b5
                                                • Opcode Fuzzy Hash: 0821f884aa5cc6b4c195274ad0b22897ff79d929f6fdf946f6e29fa30509634f
                                                • Instruction Fuzzy Hash: 1FF0E17154024CABDB60DFE0CC49FEE777CBF08705F448508BA099A184DBB59A088751
                                                Strings
                                                • C:\Users\user\Desktop\ItPTgiBC07.exe, xrefs: 00410107
                                                • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _strcat
                                                • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\ItPTgiBC07.exe
                                                • API String ID: 1765576173-2961845136
                                                • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                • String ID:
                                                • API String ID: 1794320848-0
                                                • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process$CurrentTerminate
                                                • String ID:
                                                • API String ID: 2429186680-0
                                                • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                APIs
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_
                                                • String ID:
                                                • API String ID: 1144537725-0
                                                • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                APIs
                                                • _malloc.LIBCMT ref: 0043214B
                                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                • _malloc.LIBCMT ref: 0043215D
                                                • _malloc.LIBCMT ref: 0043216F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _malloc$AllocateHeap
                                                • String ID:
                                                • API String ID: 680241177-0
                                                • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                                • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                                APIs
                                                • __wsplitpath.LIBCMT ref: 004678F7
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLast__wsplitpath_malloc
                                                • String ID:
                                                • API String ID: 4163294574-0
                                                • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                                • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                                • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                APIs
                                                  • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                • _strcat.LIBCMT ref: 0040F786
                                                  • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                  • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                • String ID:
                                                • API String ID: 3199840319-0
                                                • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                APIs
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FreeInfoLibraryParametersSystem
                                                • String ID:
                                                • API String ID: 3403648963-0
                                                • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                APIs
                                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                • __lock_file.LIBCMT ref: 00414A8D
                                                  • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                • __fclose_nolock.LIBCMT ref: 00414A98
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                • String ID:
                                                • API String ID: 2800547568-0
                                                • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                APIs
                                                • __lock_file.LIBCMT ref: 00415012
                                                • __ftell_nolock.LIBCMT ref: 0041501F
                                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                • String ID:
                                                • API String ID: 2999321469-0
                                                • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                APIs
                                                  • Part of subcall function 040FF918: GetFileAttributesW.KERNELBASE(?), ref: 040FF923
                                                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 0410020D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AttributesCreateDirectoryFile
                                                • String ID:
                                                • API String ID: 3401506121-0
                                                • Opcode ID: 2558fc09674daf0924d73d6dab5234c71d08ccaa426fa9e855ae0dacf3ede0e1
                                                • Instruction ID: 9ebb9b161776c675d1c9da17fb8bf76fb9ba336835657ef75d408912543d8f41
                                                • Opcode Fuzzy Hash: 2558fc09674daf0924d73d6dab5234c71d08ccaa426fa9e855ae0dacf3ede0e1
                                                • Instruction Fuzzy Hash: D4516131A1020996EF14DFA0D894BEE773AFF58700F00856DE60DE72C0EB759A85C765
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                                • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                                • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                                • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • _memmove.LIBCMT ref: 00444B34
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _malloc_memmove
                                                • String ID:
                                                • API String ID: 1183979061-0
                                                • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __lock_file
                                                • String ID:
                                                • API String ID: 3031932315-0
                                                • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                APIs
                                                • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FileWrite
                                                • String ID:
                                                • API String ID: 3934441357-0
                                                • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                                • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 040FF923
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction ID: 6685a685fbd4c65e376fc67d57438a280a0d222139e87977165c558ccd18db99
                                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction Fuzzy Hash: EBE08631609109FBCB50CAA88D04AAD73A8A704324F008666AA05E3980D531A901D655
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 040FF8F3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction ID: 252a4d68f33f64e428c10f308c13c378c0d35b59fc17dddedaff3a5323940d07
                                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction Fuzzy Hash: 1BD0A731A0920DFBCB10CFB49D089DD77A8D705324F004765FE15E3680D931AD009754
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wfsopen
                                                • String ID:
                                                • API String ID: 197181222-0
                                                • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                APIs
                                                • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                                • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 04101319
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction ID: 65ba017cd98cd00de0d425e5d5aa9a2d966d1f79c34ac82e18535b1c12092072
                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction Fuzzy Hash: 15E0BF7494110DEFDB00DFA4D6496DD7BB4EF04311F1045A1FD05D7680DB719E548A66
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 04101319
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 5131540a1b940194c1353434b1a3a11a14bcbfe824ac8d002d245cc730c5078d
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: ECE0E67494110DEFDB00DFB4D6496DD7BB4EF04301F104561FD01D2280D7719D508A62
                                                APIs
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                • GetKeyState.USER32(00000011), ref: 0047C92D
                                                • GetKeyState.USER32(00000009), ref: 0047C936
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                • GetKeyState.USER32(00000010), ref: 0047C953
                                                • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                • _wcsncpy.LIBCMT ref: 0047CA29
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                • SendMessageW.USER32 ref: 0047CA7F
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                • ImageList_SetDragCursorImage.COMCTL32(0091ED08,00000000,00000000,00000000), ref: 0047CB9B
                                                • ImageList_BeginDrag.COMCTL32(0091ED08,00000000,000000F8,000000F0), ref: 0047CBAC
                                                • SetCapture.USER32(?), ref: 0047CBB6
                                                • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                • ReleaseCapture.USER32 ref: 0047CC3A
                                                • GetCursorPos.USER32(?), ref: 0047CC72
                                                • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                • SendMessageW.USER32 ref: 0047CD12
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                • SendMessageW.USER32 ref: 0047CD80
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                • GetCursorPos.USER32(?), ref: 0047CDC8
                                                • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                • GetParent.USER32(00000000), ref: 0047CDF7
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                • SendMessageW.USER32 ref: 0047CE93
                                                • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,02EC1B30,00000000,?,?,?,?), ref: 0047CF1C
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                • SendMessageW.USER32 ref: 0047CF6B
                                                • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,02EC1B30,00000000,?,?,?,?), ref: 0047CFE6
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                • String ID: @GUI_DRAGID$F
                                                • API String ID: 3100379633-4164748364
                                                • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 00434420
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                • IsIconic.USER32(?), ref: 0043444F
                                                • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                • SetForegroundWindow.USER32(?), ref: 0043446A
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 2889586943-2988720461
                                                • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                APIs
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                • CloseHandle.KERNEL32(?), ref: 004463A0
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                • GetProcessWindowStation.USER32 ref: 004463D1
                                                • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                • _wcslen.LIBCMT ref: 00446498
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • _wcsncpy.LIBCMT ref: 004464C0
                                                • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                • CloseDesktop.USER32(?), ref: 0044657A
                                                • SetProcessWindowStation.USER32(?), ref: 00446588
                                                • CloseHandle.KERNEL32(?), ref: 00446592
                                                • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                • String ID: $@OH$default$winsta0
                                                • API String ID: 3324942560-3791954436
                                                • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                APIs
                                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\ItPTgiBC07.exe,0040F545,C:\Users\user\Desktop\ItPTgiBC07.exe,004A90E8,C:\Users\user\Desktop\ItPTgiBC07.exe,?,0040F545), ref: 0041013C
                                                  • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                  • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                  • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                • _wcscat.LIBCMT ref: 0044BD94
                                                • _wcscat.LIBCMT ref: 0044BDBD
                                                • __wsplitpath.LIBCMT ref: 0044BDEA
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                • _wcscpy.LIBCMT ref: 0044BE71
                                                • _wcscat.LIBCMT ref: 0044BE83
                                                • _wcscat.LIBCMT ref: 0044BE95
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 2188072990-1173974218
                                                • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                APIs
                                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                • FindClose.KERNEL32(00000000), ref: 00478924
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                • __swprintf.LIBCMT ref: 004789D3
                                                • __swprintf.LIBCMT ref: 00478A1D
                                                • __swprintf.LIBCMT ref: 00478A4B
                                                • __swprintf.LIBCMT ref: 00478A79
                                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                • __swprintf.LIBCMT ref: 00478AA7
                                                • __swprintf.LIBCMT ref: 00478AD5
                                                • __swprintf.LIBCMT ref: 00478B03
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                • API String ID: 999945258-2428617273
                                                • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                • __wsplitpath.LIBCMT ref: 00403492
                                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                • _wcscpy.LIBCMT ref: 004034A7
                                                • _wcscat.LIBCMT ref: 004034BC
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                • _wcscpy.LIBCMT ref: 004035A0
                                                • _wcslen.LIBCMT ref: 00403623
                                                • _wcslen.LIBCMT ref: 0040367D
                                                Strings
                                                • Error opening the file, xrefs: 00428231
                                                • Unterminated string, xrefs: 00428348
                                                • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                • _, xrefs: 0040371C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                • API String ID: 3393021363-188983378
                                                • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                                • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                                • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                • FindClose.KERNEL32(00000000), ref: 00431B20
                                                • FindClose.KERNEL32(00000000), ref: 00431B34
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1409584000-438819550
                                                • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                • __swprintf.LIBCMT ref: 00431C2E
                                                • _wcslen.LIBCMT ref: 00431C3A
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                • String ID: :$\$\??\%s
                                                • API String ID: 2192556992-3457252023
                                                • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                • __swprintf.LIBCMT ref: 004722B9
                                                • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FolderPath$LocalTime__swprintf
                                                • String ID: %.3d
                                                • API String ID: 3337348382-986655627
                                                • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                • FindClose.KERNEL32(00000000), ref: 0044291C
                                                • FindClose.KERNEL32(00000000), ref: 00442930
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                • FindClose.KERNEL32(00000000), ref: 004429D4
                                                  • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                • FindClose.KERNEL32(00000000), ref: 004429E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 2640511053-438819550
                                                • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                • GetLastError.KERNEL32 ref: 00433414
                                                • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                • String ID: SeShutdownPrivilege
                                                • API String ID: 2938487562-3733053543
                                                • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                APIs
                                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                  • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                  • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                • CopySid.ADVAPI32(00000000), ref: 00446271
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 1255039815-0
                                                • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                APIs
                                                • __swprintf.LIBCMT ref: 00433073
                                                • __swprintf.LIBCMT ref: 00433085
                                                • __wcsicoll.LIBCMT ref: 00433092
                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                • LockResource.KERNEL32(00000000), ref: 004330CA
                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                • LockResource.KERNEL32(?), ref: 00433120
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                • String ID:
                                                • API String ID: 1158019794-0
                                                • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                • GetLastError.KERNEL32 ref: 0045D6BF
                                                • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove$_strncmp
                                                • String ID: @oH$\$^$h
                                                • API String ID: 2175499884-3701065813
                                                • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLast$closesocket$bindlistensocket
                                                • String ID:
                                                • API String ID: 540024437-0
                                                • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                • API String ID: 0-2872873767
                                                • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                • __wsplitpath.LIBCMT ref: 00475644
                                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                • _wcscat.LIBCMT ref: 00475657
                                                • __wcsicoll.LIBCMT ref: 0047567B
                                                • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                • String ID:
                                                • API String ID: 2547909840-0
                                                • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                • FindClose.KERNEL32(?), ref: 004525FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                • String ID: *.*$\VH
                                                • API String ID: 2786137511-2657498754
                                                • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                • String ID: pqI
                                                • API String ID: 2579439406-2459173057
                                                • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                APIs
                                                • __wcsicoll.LIBCMT ref: 00433349
                                                • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                • __wcsicoll.LIBCMT ref: 00433375
                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicollmouse_event
                                                • String ID: DOWN
                                                • API String ID: 1033544147-711622031
                                                • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: KeyboardMessagePostState$InputSend
                                                • String ID:
                                                • API String ID: 3031425849-0
                                                • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                APIs
                                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLastinet_addrsocket
                                                • String ID:
                                                • API String ID: 4170576061-0
                                                • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                APIs
                                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                • IsWindowVisible.USER32 ref: 0047A368
                                                • IsWindowEnabled.USER32 ref: 0047A378
                                                • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                • IsIconic.USER32 ref: 0047A393
                                                • IsZoomed.USER32 ref: 0047A3A1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                APIs
                                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                • CoInitialize.OLE32(00000000), ref: 00478442
                                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                • CoUninitialize.OLE32 ref: 0047863C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                APIs
                                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                • CloseClipboard.USER32 ref: 0046DD0D
                                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                • CloseClipboard.USER32 ref: 0046DD41
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                • CloseClipboard.USER32 ref: 0046DD99
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                • String ID:
                                                • API String ID: 15083398-0
                                                • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: U$\
                                                • API String ID: 4104443479-100911408
                                                • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                APIs
                                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstNext
                                                • String ID:
                                                • API String ID: 3541575487-0
                                                • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                • FindClose.KERNEL32(00000000), ref: 004339EB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirst
                                                • String ID:
                                                • API String ID: 48322524-0
                                                • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                APIs
                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                • String ID:
                                                • API String ID: 901099227-0
                                                • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                APIs
                                                • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Proc
                                                • String ID:
                                                • API String ID: 2346855178-0
                                                • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                APIs
                                                • BlockInput.USER32(00000001), ref: 0045A38B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                APIs
                                                • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: LogonUser
                                                • String ID:
                                                • API String ID: 1244722697-0
                                                • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                APIs
                                                • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: N@
                                                • API String ID: 0-1509896676
                                                • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction ID: 69649029c3aef9956d0a2a179f43fd2767e7759cd124856b53742b8a3eb068f5
                                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction Fuzzy Hash: 5341B371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction ID: cc5594049a96c3b8b7f13759b4fdc8dab104c22ce8f217ea980c062425d64a99
                                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction Fuzzy Hash: 0D019D78A00209EFCB48DF98C5949AEF7B5FB88310F2086D9EC09A7741D730AE41DB80
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction ID: 64fd407030e3e3aaf4bdc022744fd72bc9010ba31ae6f1f4f5e6dbc2fac08f3e
                                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction Fuzzy Hash: 4C019278A10209EFCB48DF98C5949AEF7B5FB48310F2085D9D809A7741E730EE41DB94
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1283375078.00000000040FF000.00000040.00000020.00020000.00000000.sdmp, Offset: 040FF000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_40ff000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                APIs
                                                • DeleteObject.GDI32(?), ref: 0045953B
                                                • DeleteObject.GDI32(?), ref: 00459551
                                                • DestroyWindow.USER32(?), ref: 00459563
                                                • GetDesktopWindow.USER32 ref: 00459581
                                                • GetWindowRect.USER32(00000000), ref: 00459588
                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                • ShowWindow.USER32(?,00000004), ref: 00459865
                                                • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                • GetStockObject.GDI32(00000011), ref: 004598CD
                                                • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                • DeleteDC.GDI32(00000000), ref: 004598F8
                                                • _wcslen.LIBCMT ref: 00459916
                                                • _wcscpy.LIBCMT ref: 0045993A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                • GetDC.USER32(00000000), ref: 004599FC
                                                • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 4040870279-2373415609
                                                • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 0044181E
                                                • SetTextColor.GDI32(?,?), ref: 00441826
                                                • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                • GetSysColor.USER32(0000000F), ref: 00441849
                                                • SetBkColor.GDI32(?,?), ref: 00441864
                                                • SelectObject.GDI32(?,?), ref: 00441874
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                • GetSysColor.USER32(00000010), ref: 004418B2
                                                • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                • DeleteObject.GDI32(?), ref: 004418D5
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                • FillRect.USER32(?,?,?), ref: 00441970
                                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                  • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                  • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                  • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                  • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                  • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                  • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                  • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                  • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                  • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                • String ID:
                                                • API String ID: 69173610-0
                                                • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                APIs
                                                • DestroyWindow.USER32(?), ref: 004590F2
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                • GetStockObject.GDI32(00000011), ref: 004592AC
                                                • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                • DeleteDC.GDI32(00000000), ref: 004592D6
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                • GetStockObject.GDI32(00000011), ref: 004593D3
                                                • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 1038674560-3360698832
                                                • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                APIs
                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                • SetCursor.USER32(00000000), ref: 0043075B
                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                • SetCursor.USER32(00000000), ref: 00430773
                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                • SetCursor.USER32(00000000), ref: 0043078B
                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                • SetCursor.USER32(00000000), ref: 004307A3
                                                • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                • SetCursor.USER32(00000000), ref: 004307BB
                                                • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                • SetCursor.USER32(00000000), ref: 004307D3
                                                • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                • SetCursor.USER32(00000000), ref: 004307EB
                                                • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                • SetCursor.USER32(00000000), ref: 00430803
                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                • SetCursor.USER32(00000000), ref: 0043081B
                                                • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                • SetCursor.USER32(00000000), ref: 00430833
                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                • SetCursor.USER32(00000000), ref: 0043084B
                                                • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                • SetCursor.USER32(00000000), ref: 00430863
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                • SetCursor.USER32(00000000), ref: 0043087B
                                                • SetCursor.USER32(00000000), ref: 00430887
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                • SetCursor.USER32(00000000), ref: 0043089F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Cursor$Load
                                                • String ID:
                                                • API String ID: 1675784387-0
                                                • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                APIs
                                                • GetSysColor.USER32(0000000E), ref: 00430913
                                                • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                • GetSysColor.USER32(00000012), ref: 00430933
                                                • SetTextColor.GDI32(?,?), ref: 0043093B
                                                • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                • GetSysColor.USER32(0000000F), ref: 00430959
                                                • CreateSolidBrush.GDI32(?), ref: 00430962
                                                • GetSysColor.USER32(00000011), ref: 00430979
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                • SetBkColor.GDI32(?,?), ref: 004309A6
                                                • SelectObject.GDI32(?,?), ref: 004309B4
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                • GetSysColor.USER32(00000011), ref: 00430A9F
                                                • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                • SelectObject.GDI32(?,?), ref: 00430AD0
                                                • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                • SelectObject.GDI32(?,?), ref: 00430AE3
                                                • DeleteObject.GDI32(?), ref: 00430AE9
                                                • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1582027408-0
                                                • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseConnectCreateRegistry
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 3217815495-966354055
                                                • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 004566AE
                                                • GetDesktopWindow.USER32 ref: 004566C3
                                                • GetWindowRect.USER32(00000000), ref: 004566CA
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                • DestroyWindow.USER32(?), ref: 00456746
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                • IsWindowVisible.USER32(?), ref: 0045682C
                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                • GetWindowRect.USER32(?,?), ref: 00456873
                                                • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                • CopyRect.USER32(?,?), ref: 004568BE
                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                • String ID: ($,$tooltips_class32
                                                • API String ID: 225202481-3320066284
                                                • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                APIs
                                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                • CloseClipboard.USER32 ref: 0046DD0D
                                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                • CloseClipboard.USER32 ref: 0046DD41
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                • CloseClipboard.USER32 ref: 0046DD99
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                • String ID:
                                                • API String ID: 15083398-0
                                                • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                • GetClientRect.USER32(?,?), ref: 00471D05
                                                • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                • GetClientRect.USER32(?,?), ref: 00471E8A
                                                • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                • String ID: @$AutoIt v3 GUI
                                                • API String ID: 867697134-3359773793
                                                • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                • API String ID: 1503153545-1459072770
                                                • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll$__wcsnicmp
                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                • API String ID: 790654849-32604322
                                                • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                APIs
                                                  • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                • _fseek.LIBCMT ref: 00452B3B
                                                • __wsplitpath.LIBCMT ref: 00452B9B
                                                • _wcscpy.LIBCMT ref: 00452BB0
                                                • _wcscat.LIBCMT ref: 00452BC5
                                                • __wsplitpath.LIBCMT ref: 00452BEF
                                                • _wcscat.LIBCMT ref: 00452C07
                                                • _wcscat.LIBCMT ref: 00452C1C
                                                • __fread_nolock.LIBCMT ref: 00452C53
                                                • __fread_nolock.LIBCMT ref: 00452C64
                                                • __fread_nolock.LIBCMT ref: 00452C83
                                                • __fread_nolock.LIBCMT ref: 00452C94
                                                • __fread_nolock.LIBCMT ref: 00452CB5
                                                • __fread_nolock.LIBCMT ref: 00452CC6
                                                • __fread_nolock.LIBCMT ref: 00452CD7
                                                • __fread_nolock.LIBCMT ref: 00452CE8
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                • __fread_nolock.LIBCMT ref: 00452D78
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                • String ID:
                                                • API String ID: 2054058615-0
                                                • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window
                                                • String ID: 0
                                                • API String ID: 2353593579-4108050209
                                                • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                APIs
                                                • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                • GetWindowDC.USER32(?), ref: 0044A0F6
                                                • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                • GetSysColor.USER32(0000000F), ref: 0044A131
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                • GetSysColor.USER32(00000005), ref: 0044A15B
                                                • GetWindowDC.USER32(?), ref: 0044A1BE
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                • GetSysColor.USER32(00000008), ref: 0044A265
                                                • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                • String ID:
                                                • API String ID: 1744303182-0
                                                • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                APIs
                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                • __mtterm.LIBCMT ref: 00417C34
                                                  • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                  • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                • __init_pointers.LIBCMT ref: 00417CE6
                                                • __calloc_crt.LIBCMT ref: 00417D54
                                                • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                • API String ID: 4163708885-3819984048
                                                • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: >>>AUTOIT SCRIPT<<<$\
                                                • API String ID: 0-1896584978
                                                • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll$IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2485277191-404129466
                                                • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                APIs
                                                • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                • SetWindowTextW.USER32(?,?), ref: 00454678
                                                • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                • GetWindowRect.USER32(?,?), ref: 004546F5
                                                • SetWindowTextW.USER32(?,?), ref: 00454765
                                                • GetDesktopWindow.USER32 ref: 0045476F
                                                • GetWindowRect.USER32(00000000), ref: 00454776
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                • GetClientRect.USER32(?,?), ref: 004547D2
                                                • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                • String ID:
                                                • API String ID: 3869813825-0
                                                • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                APIs
                                                • _wcslen.LIBCMT ref: 00464B28
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                • _wcslen.LIBCMT ref: 00464C28
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                • _wcslen.LIBCMT ref: 00464CBA
                                                • _wcslen.LIBCMT ref: 00464CD0
                                                • _wcslen.LIBCMT ref: 00464CEF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$Directory$CurrentSystem
                                                • String ID: D
                                                • API String ID: 1914653954-2746444292
                                                • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                APIs
                                                • _wcsncpy.LIBCMT ref: 0045CE39
                                                • __wsplitpath.LIBCMT ref: 0045CE78
                                                • _wcscat.LIBCMT ref: 0045CE8B
                                                • _wcscat.LIBCMT ref: 0045CE9E
                                                • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                • _wcscpy.LIBCMT ref: 0045CF61
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                • String ID: *.*
                                                • API String ID: 1153243558-438819550
                                                • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll
                                                • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                • API String ID: 3832890014-4202584635
                                                • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                APIs
                                                • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                • GetFocus.USER32 ref: 0046A0DD
                                                • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessagePost$CtrlFocus
                                                • String ID: 0
                                                • API String ID: 1534620443-4108050209
                                                • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                APIs
                                                • DestroyWindow.USER32(?), ref: 004558E3
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$CreateDestroy
                                                • String ID: ,$tooltips_class32
                                                • API String ID: 1109047481-3856767331
                                                • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                • GetMenuItemCount.USER32(?), ref: 00468C45
                                                • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                • GetMenuItemCount.USER32 ref: 00468CFD
                                                • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                • GetCursorPos.USER32(?), ref: 00468D3F
                                                • SetForegroundWindow.USER32(?), ref: 00468D49
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                • String ID: 0
                                                • API String ID: 1441871840-4108050209
                                                • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                • __swprintf.LIBCMT ref: 00460915
                                                • __swprintf.LIBCMT ref: 0046092D
                                                • _wprintf.LIBCMT ref: 004609E1
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 3631882475-2268648507
                                                • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                APIs
                                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                • SendMessageW.USER32 ref: 00471740
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                • SendMessageW.USER32 ref: 0047184F
                                                • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                • String ID:
                                                • API String ID: 4116747274-0
                                                • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                • _wcslen.LIBCMT ref: 00461683
                                                • __swprintf.LIBCMT ref: 00461721
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                • GetDlgCtrlID.USER32(?), ref: 00461869
                                                • GetWindowRect.USER32(?,?), ref: 004618A4
                                                • GetParent.USER32(?), ref: 004618C3
                                                • ScreenToClient.USER32(00000000), ref: 004618CA
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                • String ID: %s%u
                                                • API String ID: 1899580136-679674701
                                                • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu$Sleep
                                                • String ID: 0
                                                • API String ID: 1196289194-4108050209
                                                • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                APIs
                                                • GetDC.USER32(00000000), ref: 0043143E
                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                • SelectObject.GDI32(00000000,?), ref: 00431466
                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                • String ID: (
                                                • API String ID: 3300687185-3887548279
                                                • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                APIs
                                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                • API String ID: 1976180769-4113822522
                                                • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                • String ID:
                                                • API String ID: 461458858-0
                                                • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                • DeleteObject.GDI32(?), ref: 004301D0
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3969911579-0
                                                • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                • String ID: 0
                                                • API String ID: 956284711-4108050209
                                                • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                • String ID: 0.0.0.0
                                                • API String ID: 1965227024-3771769585
                                                • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                APIs
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: SendString$_memmove_wcslen
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 369157077-1007645807
                                                • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                APIs
                                                • GetParent.USER32 ref: 00445BF8
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                • __wcsicoll.LIBCMT ref: 00445C33
                                                • __wcsicoll.LIBCMT ref: 00445C4F
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll$ClassMessageNameParentSend
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 3125838495-3381328864
                                                • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                APIs
                                                • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$CharNext
                                                • String ID:
                                                • API String ID: 1350042424-0
                                                • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                APIs
                                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                • _wcscpy.LIBCMT ref: 004787E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 3052893215-2127371420
                                                • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                APIs
                                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                • __swprintf.LIBCMT ref: 0045E7F7
                                                • _wprintf.LIBCMT ref: 0045E8B3
                                                • _wprintf.LIBCMT ref: 0045E8D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 2295938435-2354261254
                                                • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __swprintf_wcscpy$__i64tow__itow
                                                • String ID: %.15g$0x%p$False$True
                                                • API String ID: 3038501623-2263619337
                                                • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                APIs
                                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                • __swprintf.LIBCMT ref: 0045E5F6
                                                • _wprintf.LIBCMT ref: 0045E6A3
                                                • _wprintf.LIBCMT ref: 0045E6C7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 2295938435-8599901
                                                • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                APIs
                                                • timeGetTime.WINMM ref: 00443B67
                                                  • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                • IsWindow.USER32(00000000), ref: 00443C3A
                                                • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                • String ID: BUTTON
                                                • API String ID: 1834419854-3405671355
                                                • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                • LoadStringW.USER32(00000000), ref: 00454040
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • _wprintf.LIBCMT ref: 00454074
                                                • __swprintf.LIBCMT ref: 004540A3
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 455036304-4153970271
                                                • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                APIs
                                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                • _memmove.LIBCMT ref: 00467EB8
                                                • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                • _memmove.LIBCMT ref: 00467F6C
                                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                • String ID:
                                                • API String ID: 2170234536-0
                                                • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00453CE0
                                                • SetKeyboardState.USER32(?), ref: 00453D3B
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                • GetKeyState.USER32(000000A0), ref: 00453D75
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                • GetKeyState.USER32(00000011), ref: 00453DEF
                                                • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                • GetKeyState.USER32(00000012), ref: 00453E26
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                APIs
                                                • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                • DeleteObject.GDI32(?), ref: 0047151E
                                                • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                • DeleteObject.GDI32(?), ref: 004715EA
                                                • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                • String ID:
                                                • API String ID: 3218148540-0
                                                • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                • String ID:
                                                • API String ID: 136442275-0
                                                • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                APIs
                                                • _wcsncpy.LIBCMT ref: 00467490
                                                • _wcsncpy.LIBCMT ref: 004674BC
                                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                • _wcstok.LIBCMT ref: 004674FF
                                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                • _wcstok.LIBCMT ref: 004675B2
                                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                • _wcslen.LIBCMT ref: 00467793
                                                • _wcscpy.LIBCMT ref: 00467641
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • _wcslen.LIBCMT ref: 004677BD
                                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                • String ID: X
                                                • API String ID: 3104067586-3081909835
                                                • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                • _wcslen.LIBCMT ref: 0046CDB0
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                  • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                  • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                  • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                Strings
                                                • NULL Pointer assignment, xrefs: 0046CEA6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 440038798-2785691316
                                                • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                • _wcslen.LIBCMT ref: 004610A3
                                                • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                • GetWindowRect.USER32(?,?), ref: 00461248
                                                  • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                • String ID: ThumbnailClass
                                                • API String ID: 4136854206-1241985126
                                                • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                APIs
                                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                • GetClientRect.USER32(?,?), ref: 00471A1A
                                                • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                • DestroyIcon.USER32(?), ref: 00471AF4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                • String ID: 2
                                                • API String ID: 1331449709-450215437
                                                • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                • __swprintf.LIBCMT ref: 00460915
                                                • __swprintf.LIBCMT ref: 0046092D
                                                • _wprintf.LIBCMT ref: 004609E1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                • API String ID: 3054410614-2561132961
                                                • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                APIs
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 600699880-22481851
                                                • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DestroyWindow
                                                • String ID: static
                                                • API String ID: 3375834691-2160076837
                                                • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                • API String ID: 2907320926-3566645568
                                                • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                APIs
                                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                • DeleteObject.GDI32(00460000), ref: 00470A04
                                                • DestroyIcon.USER32(004F0052), ref: 00470A1C
                                                • DeleteObject.GDI32(871B6E0B), ref: 00470A34
                                                • DestroyWindow.USER32(003D0050), ref: 00470A4C
                                                • DestroyIcon.USER32(?), ref: 00470A73
                                                • DestroyIcon.USER32(?), ref: 00470A81
                                                • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 1237572874-0
                                                • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                • VariantInit.OLEAUT32(?), ref: 004793E1
                                                • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                • VariantClear.OLEAUT32(?), ref: 00479489
                                                • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                • VariantClear.OLEAUT32(?), ref: 004794CA
                                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 0044480E
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                • GetKeyState.USER32(000000A0), ref: 004448AA
                                                • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                • GetKeyState.USER32(000000A1), ref: 004448D9
                                                • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                • GetKeyState.USER32(00000011), ref: 00444903
                                                • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                • GetKeyState.USER32(00000012), ref: 0044492D
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                • GetKeyState.USER32(0000005B), ref: 00444958
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                • String ID:
                                                • API String ID: 3413494760-0
                                                • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressProc_free_malloc$_strcat_strlen
                                                • String ID: AU3_FreeVar
                                                • API String ID: 2634073740-771828931
                                                • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                APIs
                                                • CoInitialize.OLE32 ref: 0046C63A
                                                • CoUninitialize.OLE32 ref: 0046C645
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                  • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                • IIDFromString.OLE32(?,?), ref: 0046C705
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 2294789929-1287834457
                                                • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                APIs
                                                  • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                  • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                • ReleaseCapture.USER32 ref: 0047116F
                                                • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                • API String ID: 2483343779-2107944366
                                                • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                • _wcslen.LIBCMT ref: 00450720
                                                • _wcscat.LIBCMT ref: 00450733
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcscat_wcslen
                                                • String ID: -----$SysListView32
                                                • API String ID: 4008455318-3975388722
                                                • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                • GetParent.USER32 ref: 00469C98
                                                • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                • GetParent.USER32 ref: 00469CBC
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 2360848162-1403004172
                                                • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                • String ID:
                                                • API String ID: 262282135-0
                                                • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow
                                                • String ID:
                                                • API String ID: 312131281-0
                                                • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                APIs
                                                  • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                • SendMessageW.USER32(75A523D0,00001001,00000000,?), ref: 00448E16
                                                • SendMessageW.USER32(75A523D0,00001026,00000000,?), ref: 00448E25
                                                  • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                • String ID:
                                                • API String ID: 3771399671-0
                                                • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                • String ID:
                                                • API String ID: 2156557900-0
                                                • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                • API String ID: 0-1603158881
                                                • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                APIs
                                                • CreateMenu.USER32 ref: 00448603
                                                • SetMenu.USER32(?,00000000), ref: 00448613
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                • IsMenu.USER32(?), ref: 004486AB
                                                • CreatePopupMenu.USER32 ref: 004486B5
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                • DrawMenuBar.USER32 ref: 004486F5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                • String ID: 0
                                                • API String ID: 161812096-4108050209
                                                • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\ItPTgiBC07.exe), ref: 00434057
                                                • LoadStringW.USER32(00000000), ref: 00434060
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                • LoadStringW.USER32(00000000), ref: 00434078
                                                • _wprintf.LIBCMT ref: 004340A1
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                Strings
                                                • C:\Users\user\Desktop\ItPTgiBC07.exe, xrefs: 00434040
                                                • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\ItPTgiBC07.exe
                                                • API String ID: 3648134473-132755497
                                                • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                APIs
                                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\ItPTgiBC07.exe,0040F545,C:\Users\user\Desktop\ItPTgiBC07.exe,004A90E8,C:\Users\user\Desktop\ItPTgiBC07.exe,?,0040F545), ref: 0041013C
                                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                • String ID:
                                                • API String ID: 978794511-0
                                                • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove$_memcmp
                                                • String ID: '$\$h
                                                • API String ID: 2205784470-1303700344
                                                • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                APIs
                                                • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                • VariantClear.OLEAUT32 ref: 0045EA6D
                                                • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                • __swprintf.LIBCMT ref: 0045EC33
                                                • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                Strings
                                                • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                • String ID: %4d%02d%02d%02d%02d%02d
                                                • API String ID: 2441338619-1568723262
                                                • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                APIs
                                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Interlocked$DecrementIncrement$Sleep
                                                • String ID: @COM_EVENTOBJ
                                                • API String ID: 327565842-2228938565
                                                • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                APIs
                                                • VariantClear.OLEAUT32(?), ref: 0047031B
                                                • VariantClear.OLEAUT32(?), ref: 0047044F
                                                • VariantInit.OLEAUT32(?), ref: 004704A3
                                                • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                • VariantClear.OLEAUT32(?), ref: 00470516
                                                  • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                  • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                • String ID: H
                                                • API String ID: 3613100350-2852464175
                                                • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                • DestroyWindow.USER32(?), ref: 00426F50
                                                • UnregisterHotKey.USER32(?), ref: 00426F77
                                                • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 4174999648-3243417748
                                                • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                • String ID:
                                                • API String ID: 1291720006-3916222277
                                                • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                • IsMenu.USER32(?), ref: 0045FC5F
                                                • CreatePopupMenu.USER32 ref: 0045FC97
                                                • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                • String ID: 0$2
                                                • API String ID: 93392585-3793063076
                                                • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                APIs
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                • VariantClear.OLEAUT32(?), ref: 00435320
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                • VariantClear.OLEAUT32(?), ref: 004353B3
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                • String ID: crts
                                                • API String ID: 586820018-3724388283
                                                • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                APIs
                                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\ItPTgiBC07.exe,0040F545,C:\Users\user\Desktop\ItPTgiBC07.exe,004A90E8,C:\Users\user\Desktop\ItPTgiBC07.exe,?,0040F545), ref: 0041013C
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                • _wcscat.LIBCMT ref: 0044BCAF
                                                • _wcslen.LIBCMT ref: 0044BCBB
                                                • _wcslen.LIBCMT ref: 0044BCD1
                                                • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 2326526234-1173974218
                                                • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                APIs
                                                  • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                • _wcslen.LIBCMT ref: 004335F2
                                                • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                • GetLastError.KERNEL32 ref: 0043362B
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                • _wcsrchr.LIBCMT ref: 00433666
                                                  • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                • String ID: \
                                                • API String ID: 321622961-2967466578
                                                • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 1038674560-2734436370
                                                • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                APIs
                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                • __lock.LIBCMT ref: 00417981
                                                  • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                  • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                  • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                • __lock.LIBCMT ref: 004179A2
                                                • ___addlocaleref.LIBCMT ref: 004179C0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                • String ID: KERNEL32.DLL$pI
                                                • API String ID: 637971194-197072765
                                                • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove$_malloc
                                                • String ID:
                                                • API String ID: 1938898002-0
                                                • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                • _memmove.LIBCMT ref: 0044B555
                                                • _memmove.LIBCMT ref: 0044B578
                                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                • String ID:
                                                • API String ID: 2737351978-0
                                                • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                APIs
                                                • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                • __calloc_crt.LIBCMT ref: 00415246
                                                • __getptd.LIBCMT ref: 00415253
                                                • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                • _free.LIBCMT ref: 0041529E
                                                • __dosmaperr.LIBCMT ref: 004152A9
                                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                • String ID:
                                                • API String ID: 3638380555-0
                                                • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$Copy$ClearErrorInitLast
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 3207048006-625585964
                                                • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                • gethostbyname.WSOCK32(?), ref: 004655A6
                                                • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                • _memmove.LIBCMT ref: 004656CA
                                                • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                • WSACleanup.WSOCK32 ref: 00465762
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                • String ID:
                                                • API String ID: 2945290962-0
                                                • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                APIs
                                                • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                • String ID:
                                                • API String ID: 1457242333-0
                                                • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ConnectRegistry_memmove_wcslen
                                                • String ID:
                                                • API String ID: 15295421-0
                                                • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                APIs
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • _wcstok.LIBCMT ref: 004675B2
                                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                • _wcscpy.LIBCMT ref: 00467641
                                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                • _wcslen.LIBCMT ref: 00467793
                                                • _wcslen.LIBCMT ref: 004677BD
                                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                • String ID: X
                                                • API String ID: 780548581-3081909835
                                                • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                APIs
                                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                • CloseFigure.GDI32(?), ref: 0044751F
                                                • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                • String ID:
                                                • API String ID: 4082120231-0
                                                • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                • String ID:
                                                • API String ID: 2027346449-0
                                                • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                • GetMenu.USER32 ref: 0047A703
                                                • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                • _wcslen.LIBCMT ref: 0047A79E
                                                • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                • String ID:
                                                • API String ID: 3257027151-0
                                                • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                APIs
                                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLastselect
                                                • String ID:
                                                • API String ID: 215497628-0
                                                • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                APIs
                                                • GetParent.USER32(?), ref: 0044443B
                                                • GetKeyboardState.USER32(?), ref: 00444450
                                                • SetKeyboardState.USER32(?), ref: 004444A4
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                APIs
                                                • GetParent.USER32(?), ref: 00444633
                                                • GetKeyboardState.USER32(?), ref: 00444648
                                                • SetKeyboardState.USER32(?), ref: 0044469C
                                                • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                APIs
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                • DeleteObject.GDI32(?), ref: 00455736
                                                • DeleteObject.GDI32(?), ref: 00455744
                                                • DestroyIcon.USER32(?), ref: 00455752
                                                • DestroyWindow.USER32(?), ref: 00455760
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                • String ID:
                                                • API String ID: 2354583917-0
                                                • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                APIs
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Enable$Show$MessageMoveSend
                                                • String ID:
                                                • API String ID: 896007046-0
                                                • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                APIs
                                                • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                • GetFocus.USER32 ref: 00448ACF
                                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Enable$Show$FocusMessageSend
                                                • String ID:
                                                • API String ID: 3429747543-0
                                                • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                APIs
                                                  • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                  • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                  • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                • String ID:
                                                • API String ID: 3300667738-0
                                                • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                • __swprintf.LIBCMT ref: 0045D4E9
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                • String ID: %lu$\VH
                                                • API String ID: 3164766367-2432546070
                                                • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                APIs
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Msctls_Progress32
                                                • API String ID: 3850602802-3636473452
                                                • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                • String ID:
                                                • API String ID: 3985565216-0
                                                • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                APIs
                                                • _malloc.LIBCMT ref: 0041F707
                                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                • _free.LIBCMT ref: 0041F71A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free_malloc
                                                • String ID: [B
                                                • API String ID: 1020059152-632041663
                                                • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                APIs
                                                • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                • __calloc_crt.LIBCMT ref: 00413DB0
                                                • __getptd.LIBCMT ref: 00413DBD
                                                • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                • _free.LIBCMT ref: 00413E07
                                                • __dosmaperr.LIBCMT ref: 00413E12
                                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                • String ID:
                                                • API String ID: 155776804-0
                                                • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                APIs
                                                  • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                  • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                APIs
                                                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                • ExitThread.KERNEL32 ref: 00413D4E
                                                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                • __freefls@4.LIBCMT ref: 00413D74
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                • String ID:
                                                • API String ID: 259663610-0
                                                • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                APIs
                                                • GetClientRect.USER32(?,?), ref: 004302E6
                                                • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                • GetClientRect.USER32(?,?), ref: 00430364
                                                • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                • GetWindowRect.USER32(?,?), ref: 004303C3
                                                • ScreenToClient.USER32(?,?), ref: 004303EC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Rect$Client$Window$MetricsScreenSystem
                                                • String ID:
                                                • API String ID: 3220332590-0
                                                • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _malloc_wcslen$_strcat_wcscpy
                                                • String ID:
                                                • API String ID: 1612042205-0
                                                • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove_strncmp
                                                • String ID: >$U$\
                                                • API String ID: 2666721431-237099441
                                                • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 0044C570
                                                • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$InputSend
                                                • String ID:
                                                • API String ID: 2221674350-0
                                                • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcscpy$_wcscat
                                                • String ID:
                                                • API String ID: 2037614760-0
                                                • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                APIs
                                                • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$Copy$AllocClearErrorLastString
                                                • String ID:
                                                • API String ID: 960795272-0
                                                • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                APIs
                                                • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                • EndPaint.USER32(?,?), ref: 00447D13
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                • String ID:
                                                • API String ID: 4189319755-0
                                                • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                APIs
                                                • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow$InvalidateRect
                                                • String ID:
                                                • API String ID: 1976402638-0
                                                • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                APIs
                                                • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$Copy$ClearErrorLast
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 2487901850-572801152
                                                • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                APIs
                                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Enable$Show$MessageSend
                                                • String ID:
                                                • API String ID: 1871949834-0
                                                • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                APIs
                                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                • SendMessageW.USER32 ref: 00471AE3
                                                • DestroyIcon.USER32(?), ref: 00471AF4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                • String ID:
                                                • API String ID: 3611059338-0
                                                • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DestroyWindow$DeleteObject$IconMove
                                                • String ID:
                                                • API String ID: 1640429340-0
                                                • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                APIs
                                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                • _wcslen.LIBCMT ref: 004438CD
                                                • _wcslen.LIBCMT ref: 004438E6
                                                • _wcstok.LIBCMT ref: 004438F8
                                                • _wcslen.LIBCMT ref: 0044390C
                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                • _wcstok.LIBCMT ref: 00443931
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                • String ID:
                                                • API String ID: 3632110297-0
                                                • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteMenuObject$IconWindow
                                                • String ID:
                                                • API String ID: 752480666-0
                                                • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                • String ID:
                                                • API String ID: 3275902921-0
                                                • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                • String ID:
                                                • API String ID: 3275902921-0
                                                • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                APIs
                                                • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                APIs
                                                • SendMessageW.USER32 ref: 004555C7
                                                • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                • DeleteObject.GDI32(?), ref: 00455736
                                                • DeleteObject.GDI32(?), ref: 00455744
                                                • DestroyIcon.USER32(?), ref: 00455752
                                                • DestroyWindow.USER32(?), ref: 00455760
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                • String ID:
                                                • API String ID: 3691411573-0
                                                • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                APIs
                                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                • LineTo.GDI32(?,?,?), ref: 004472AC
                                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                • LineTo.GDI32(?,?,?), ref: 004472C6
                                                • EndPath.GDI32(?), ref: 004472D6
                                                • StrokePath.GDI32(?), ref: 004472E4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                • String ID:
                                                • API String ID: 372113273-0
                                                • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                APIs
                                                • GetDC.USER32(00000000), ref: 0044CC6D
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CapsDevice$Release
                                                • String ID:
                                                • API String ID: 1035833867-0
                                                • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                APIs
                                                • __getptd.LIBCMT ref: 0041708E
                                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                • __amsg_exit.LIBCMT ref: 004170AE
                                                • __lock.LIBCMT ref: 004170BE
                                                • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                • _free.LIBCMT ref: 004170EE
                                                • InterlockedIncrement.KERNEL32(02EC2DB0), ref: 00417106
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                • String ID:
                                                • API String ID: 3470314060-0
                                                • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                  • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                APIs
                                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                • ExitThread.KERNEL32 ref: 004151ED
                                                • __freefls@4.LIBCMT ref: 00415209
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                • String ID:
                                                • API String ID: 442100245-0
                                                • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                APIs
                                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                • _wcslen.LIBCMT ref: 0045F94A
                                                • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                • String ID: 0
                                                • API String ID: 621800784-4108050209
                                                • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • SetErrorMode.KERNEL32 ref: 004781CE
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                • SetErrorMode.KERNEL32(?), ref: 00478270
                                                • SetErrorMode.KERNEL32(?), ref: 00478340
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                • String ID: \VH
                                                • API String ID: 3884216118-234962358
                                                • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                • IsMenu.USER32(?), ref: 0044854D
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                • DrawMenuBar.USER32 ref: 004485AF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$Item$DrawInfoInsert
                                                • String ID: 0
                                                • API String ID: 3076010158-4108050209
                                                • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$_memmove_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1589278365-1403004172
                                                • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Handle
                                                • String ID: nul
                                                • API String ID: 2519475695-2873401336
                                                • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Handle
                                                • String ID: nul
                                                • API String ID: 2519475695-2873401336
                                                • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: SysAnimate32
                                                • API String ID: 0-1011021900
                                                • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                APIs
                                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                  • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                  • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                  • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                  • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                • GetFocus.USER32 ref: 0046157B
                                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                • __swprintf.LIBCMT ref: 00461608
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                • String ID: %s%d
                                                • API String ID: 2645982514-1110647743
                                                • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                APIs
                                                • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3488606520-0
                                                • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                APIs
                                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ConnectRegistry_memmove_wcslen
                                                • String ID:
                                                • API String ID: 15295421-0
                                                • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                APIs
                                                • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressProc$Library$FreeLoad
                                                • String ID:
                                                • API String ID: 2449869053-0
                                                • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 004563A6
                                                • ScreenToClient.USER32(?,?), ref: 004563C3
                                                • GetAsyncKeyState.USER32(?), ref: 00456400
                                                • GetAsyncKeyState.USER32(?), ref: 00456410
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorLongScreenWindow
                                                • String ID:
                                                • API String ID: 3539004672-0
                                                • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                APIs
                                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Interlocked$DecrementIncrement$Sleep
                                                • String ID:
                                                • API String ID: 327565842-0
                                                • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String
                                                • String ID:
                                                • API String ID: 2832842796-0
                                                • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Enum$CloseDeleteOpen
                                                • String ID:
                                                • API String ID: 2095303065-0
                                                • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00436A24
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: RectWindow
                                                • String ID:
                                                • API String ID: 861336768-0
                                                • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                APIs
                                                • SendMessageW.USER32 ref: 00449598
                                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                • _wcslen.LIBCMT ref: 0044960D
                                                • _wcslen.LIBCMT ref: 0044961A
                                                • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$_wcslen$_wcspbrk
                                                • String ID:
                                                • API String ID: 1856069659-0
                                                • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 004478E2
                                                • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                • GetCursorPos.USER32(00000000), ref: 0044796A
                                                • TrackPopupMenuEx.USER32(02EC6510,00000000,00000000,?,?,00000000), ref: 00447991
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CursorMenuPopupTrack$Proc
                                                • String ID:
                                                • API String ID: 1300944170-0
                                                • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                APIs
                                                • GetClientRect.USER32(?,?), ref: 004479CC
                                                • GetCursorPos.USER32(?), ref: 004479D7
                                                • ScreenToClient.USER32(?,?), ref: 004479F3
                                                • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Client$CursorFromPointProcRectScreenWindow
                                                • String ID:
                                                • API String ID: 1822080540-0
                                                • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                • EndPaint.USER32(?,?), ref: 00447D13
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                • String ID:
                                                • API String ID: 659298297-0
                                                • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                APIs
                                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                  • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                  • Part of subcall function 00440D98: SendMessageW.USER32(02EC1B30,000000F1,00000000,00000000), ref: 00440E6E
                                                  • Part of subcall function 00440D98: SendMessageW.USER32(02EC1B30,000000F1,00000001,00000000), ref: 00440E9A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$EnableMessageSend$LongShow
                                                • String ID:
                                                • API String ID: 142311417-0
                                                • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00445879
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                • _wcslen.LIBCMT ref: 004458FB
                                                • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                • String ID:
                                                • API String ID: 3087257052-0
                                                • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                APIs
                                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                • String ID:
                                                • API String ID: 245547762-0
                                                • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 004471D8
                                                • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                • SelectObject.GDI32(?,00000000), ref: 00447228
                                                • BeginPath.GDI32(?), ref: 0044723D
                                                • SelectObject.GDI32(?,00000000), ref: 00447266
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Object$Select$BeginCreateDeletePath
                                                • String ID:
                                                • API String ID: 2338827641-0
                                                • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 00434598
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                • Sleep.KERNEL32(00000000), ref: 004345D4
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                • MessageBeep.USER32(00000000), ref: 00460C46
                                                • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                • EndDialog.USER32(?,00000001), ref: 00460C83
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteObjectWindow$Icon
                                                • String ID:
                                                • API String ID: 4023252218-0
                                                • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                APIs
                                                • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                • DeleteObject.GDI32(?), ref: 00455736
                                                • DeleteObject.GDI32(?), ref: 00455744
                                                • DestroyIcon.USER32(?), ref: 00455752
                                                • DestroyWindow.USER32(?), ref: 00455760
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                • String ID:
                                                • API String ID: 1489400265-0
                                                • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                APIs
                                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                • DestroyWindow.USER32(?), ref: 00455728
                                                • DeleteObject.GDI32(?), ref: 00455736
                                                • DeleteObject.GDI32(?), ref: 00455744
                                                • DestroyIcon.USER32(?), ref: 00455752
                                                • DestroyWindow.USER32(?), ref: 00455760
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                • String ID:
                                                • API String ID: 1042038666-0
                                                • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                APIs
                                                • __getptd.LIBCMT ref: 0041780F
                                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                • __getptd.LIBCMT ref: 00417826
                                                • __amsg_exit.LIBCMT ref: 00417834
                                                • __lock.LIBCMT ref: 00417844
                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                • String ID:
                                                • API String ID: 938513278-0
                                                • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                APIs
                                                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                • ExitThread.KERNEL32 ref: 00413D4E
                                                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                • __freefls@4.LIBCMT ref: 00413D74
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                • String ID:
                                                • API String ID: 2403457894-0
                                                • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                APIs
                                                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                • ExitThread.KERNEL32 ref: 004151ED
                                                • __freefls@4.LIBCMT ref: 00415209
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                • String ID:
                                                • API String ID: 4247068974-0
                                                • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: )$U$\
                                                • API String ID: 0-3705770531
                                                • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                APIs
                                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                • CoInitialize.OLE32(00000000), ref: 0046E505
                                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                • CoUninitialize.OLE32 ref: 0046E53D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \
                                                • API String ID: 4104443479-2967466578
                                                • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \
                                                • API String ID: 4104443479-2967466578
                                                • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \
                                                • API String ID: 4104443479-2967466578
                                                • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                Strings
                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                • API String ID: 708495834-557222456
                                                • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                APIs
                                                  • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                  • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                  • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                  • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                  • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \$]$h
                                                • API String ID: 4104443479-3262404753
                                                • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                APIs
                                                • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                • CloseHandle.KERNEL32(?), ref: 00457E09
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                • String ID: <$@
                                                • API String ID: 2417854910-1426351568
                                                • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3705125965-3916222277
                                                • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                APIs
                                                • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem
                                                • String ID: 0
                                                • API String ID: 135850232-4108050209
                                                • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                APIs
                                                • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: AU3_GetPluginDetails
                                                • API String ID: 145871493-4132174516
                                                • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                APIs
                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: SysMonthCal32
                                                • API String ID: 2326795674-1439706946
                                                • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 3375834691-2298589950
                                                • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: $<
                                                • API String ID: 4104443479-428540627
                                                • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID: \VH
                                                • API String ID: 1682464887-234962358
                                                • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID: \VH
                                                • API String ID: 1682464887-234962358
                                                • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID: \VH
                                                • API String ID: 1682464887-234962358
                                                • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: \VH
                                                • API String ID: 2507767853-234962358
                                                • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: \VH
                                                • API String ID: 2507767853-234962358
                                                • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                • String ID: crts
                                                • API String ID: 943502515-3724388283
                                                • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorMode$LabelVolume
                                                • String ID: \VH
                                                • API String ID: 2006950084-234962358
                                                • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                APIs
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • GetMenuItemInfoW.USER32 ref: 00449727
                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                • DrawMenuBar.USER32 ref: 00449761
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Menu$InfoItem$Draw_malloc
                                                • String ID: 0
                                                • API String ID: 772068139-4108050209
                                                • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$_wcscpy
                                                • String ID: 3, 3, 8, 1
                                                • API String ID: 3469035223-357260408
                                                • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                APIs
                                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: ICMP.DLL$IcmpCloseHandle
                                                • API String ID: 2574300362-3530519716
                                                • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                APIs
                                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: ICMP.DLL$IcmpCreateFile
                                                • API String ID: 2574300362-275556492
                                                • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                APIs
                                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: ICMP.DLL$IcmpSendEcho
                                                • API String ID: 2574300362-58917771
                                                • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                APIs
                                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2574300362-4033151799
                                                • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 0047950F
                                                • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                • VariantClear.OLEAUT32(?), ref: 00479650
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyInitString
                                                • String ID:
                                                • API String ID: 2808897238-0
                                                • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                APIs
                                                • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                • __itow.LIBCMT ref: 004699CD
                                                  • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                • __itow.LIBCMT ref: 00469A97
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow
                                                • String ID:
                                                • API String ID: 3379773720-0
                                                • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                • ScreenToClient.USER32(?,?), ref: 00449A80
                                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                • String ID:
                                                • API String ID: 2782032738-0
                                                • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                APIs
                                                • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                • GetWindowRect.USER32(?,?), ref: 00441722
                                                • PtInRect.USER32(?,?,?), ref: 00441734
                                                • MessageBeep.USER32(00000000), ref: 004417AD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                APIs
                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                • __isleadbyte_l.LIBCMT ref: 004208A6
                                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                • String ID:
                                                • API String ID: 3058430110-0
                                                • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                APIs
                                                • GetParent.USER32(?), ref: 004503C8
                                                • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Proc$Parent
                                                • String ID:
                                                • API String ID: 2351499541-0
                                                • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                • TranslateMessage.USER32(?), ref: 00442B01
                                                • DispatchMessageW.USER32(?), ref: 00442B0B
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchTranslate
                                                • String ID:
                                                • API String ID: 1795658109-0
                                                • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                • GetCaretPos.USER32(?), ref: 004743B2
                                                • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                • GetForegroundWindow.USER32 ref: 004743EE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                APIs
                                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                • _wcslen.LIBCMT ref: 00449519
                                                • _wcslen.LIBCMT ref: 00449526
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend_wcslen$_wcspbrk
                                                • String ID:
                                                • API String ID: 2886238975-0
                                                • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __setmode$DebugOutputString_fprintf
                                                • String ID:
                                                • API String ID: 1792727568-0
                                                • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                APIs
                                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                APIs
                                                  • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                  • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                  • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                • String ID: cdecl
                                                • API String ID: 3850814276-3896280584
                                                • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                APIs
                                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                • _memmove.LIBCMT ref: 0046D475
                                                • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                • String ID:
                                                • API String ID: 2502553879-0
                                                • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                APIs
                                                • SendMessageW.USER32 ref: 00448C69
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow
                                                • String ID:
                                                • API String ID: 312131281-0
                                                • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                APIs
                                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLastacceptselect
                                                • String ID:
                                                • API String ID: 385091864-0
                                                • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                • GetStockObject.GDI32(00000011), ref: 00430258
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Window$CreateMessageObjectSendShowStock
                                                • String ID:
                                                • API String ID: 1358664141-0
                                                • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ClientRectScreen$InvalidateWindow
                                                • String ID:
                                                • API String ID: 357397906-0
                                                • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                APIs
                                                • __wsplitpath.LIBCMT ref: 0043392E
                                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                • __wsplitpath.LIBCMT ref: 00433950
                                                • __wcsicoll.LIBCMT ref: 00433974
                                                • __wcsicoll.LIBCMT ref: 0043398A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                • String ID:
                                                • API String ID: 1187119602-0
                                                • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                • String ID:
                                                • API String ID: 1597257046-0
                                                • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                • __malloc_crt.LIBCMT ref: 0041F5B6
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: EnvironmentStrings$Free__malloc_crt
                                                • String ID:
                                                • API String ID: 237123855-0
                                                • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: DeleteDestroyObject$IconWindow
                                                • String ID:
                                                • API String ID: 3349847261-0
                                                • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                APIs
                                                • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                • String ID:
                                                • API String ID: 2223660684-0
                                                • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                APIs
                                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                • LineTo.GDI32(?,?,?), ref: 00447326
                                                • EndPath.GDI32(?), ref: 00447336
                                                • StrokePath.GDI32(?), ref: 00447344
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                • String ID:
                                                • API String ID: 2783949968-0
                                                • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                  • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                  • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 00472B63
                                                • GetDC.USER32(00000000), ref: 00472B6C
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 00472BB2
                                                • GetDC.USER32(00000000), ref: 00472BBB
                                                • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                APIs
                                                • __getptd_noexit.LIBCMT ref: 00415150
                                                  • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                  • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                  • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                  • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                  • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                • __freeptd.LIBCMT ref: 0041516B
                                                • ExitThread.KERNEL32 ref: 00415173
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                • String ID:
                                                • API String ID: 1454798553-0
                                                • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _strncmp
                                                • String ID: Q\E
                                                • API String ID: 909875538-2189900498
                                                • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                APIs
                                                • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                  • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                • String ID: AutoIt3GUI$Container
                                                • API String ID: 2652923123-3941886329
                                                • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove_strncmp
                                                • String ID: U$\
                                                • API String ID: 2666721431-100911408
                                                • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                APIs
                                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                • __wcsnicmp.LIBCMT ref: 00467288
                                                • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                • String ID: LPT
                                                • API String ID: 3035604524-1350329615
                                                • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \$h
                                                • API String ID: 4104443479-677774858
                                                • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID: &
                                                • API String ID: 2931989736-1010288
                                                • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: \
                                                • API String ID: 4104443479-2967466578
                                                • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                APIs
                                                • _wcslen.LIBCMT ref: 00466825
                                                • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CrackInternet_wcslen
                                                • String ID: |
                                                • API String ID: 596671847-2343686810
                                                • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                APIs
                                                • _strlen.LIBCMT ref: 0040F858
                                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                • _sprintf.LIBCMT ref: 0040F9AE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove$_sprintf_strlen
                                                • String ID: %02X
                                                • API String ID: 1921645428-436463671
                                                • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: htonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 3832099526-2422070025
                                                • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: InternetOpen
                                                • String ID: <local>
                                                • API String ID: 2038078732-4266983199
                                                • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: __fread_nolock_memmove
                                                • String ID: EA06
                                                • API String ID: 1988441806-3962188686
                                                • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: u,D
                                                • API String ID: 4104443479-3858472334
                                                • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                APIs
                                                • _wcslen.LIBCMT ref: 00401B11
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • _memmove.LIBCMT ref: 00401B57
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                • String ID: @EXITCODE
                                                • API String ID: 2734553683-3436989551
                                                • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                APIs
                                                • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • wsprintfW.USER32 ref: 0045612A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: MessageSend_mallocwsprintf
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 1262938277-328681919
                                                • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                APIs
                                                • InternetCloseHandle.WININET(?), ref: 00442663
                                                • InternetCloseHandle.WININET ref: 00442668
                                                  • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: CloseHandleInternet$ObjectSingleWait
                                                • String ID: aeB
                                                • API String ID: 857135153-906807131
                                                • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: _wcsncpy
                                                • String ID: ^B$C:\Users\user\Desktop\ItPTgiBC07.exe
                                                • API String ID: 1735881322-1462090872
                                                • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                • PostMessageW.USER32(00000000), ref: 00441C05
                                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                  • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1280065485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1280040430.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280142512.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280168848.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280193686.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280212880.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.1280266519.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_ItPTgiBC07.jbxd
                                                Similarity
                                                • API ID: Message_doexit
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 1993061046-4017498283
                                                • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D